Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
An Identity-Based Signature from Gap Diffie-Hellman Groups - MaRDI portal

An Identity-Based Signature from Gap Diffie-Hellman Groups

From MaRDI portal
Publication:4414695

DOI10.1007/3-540-36288-6_2zbMath1033.94554OpenAlexW2112914778MaRDI QIDQ4414695

Jae Choon Cha, Jung Hee Cheon

Publication date: 27 July 2003

Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36288-6_2




Related Items

A new ID-based proxy multi-signature scheme from bilinear pairingsEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesBlockchain-based system for secure outsourcing of bilinear pairingsChosen ciphertext secure authenticated group communication using identity-based signcryptionEfficient traceable ring signature scheme without pairingsBatch verification of short signaturesForward-secure revocable identity-based encryptionOne-Round Attribute-Based Key Exchange in the Multi-party SettingForward-secure identity-based signature: security notions and constructionTwo Notes on the Security of Certificateless SignaturesTraceable Identity-Based Group SignatureAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelForward-secure ID based digital signature scheme with forward-secure private key generatorIdentity-based signature and extended forking algorithm in the multivariate quadratic settingEfficient IBS from a new assumption in the multivariate-quadratic settingIdentity-based chameleon hashing and signatures without key exposureFaster pairing computation on genus \(2\) hyperelliptic curvesOne-Round Attribute-Based Key Exchange in the Multi-Party SettingSecurity weaknesses of a signature scheme and authenticated key agreement protocolsAn efficient identity based generalized signcryption schemeEfficient algorithms for secure outsourcing of bilinear pairingsEta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)Identity-based deniable authentication for ad hoc networksSimplified small exponent test for batch verificationIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesA new framework for the design and analysis of identity-based identification schemesAn efficient online/offline ID-based short signature procedure using extended chaotic mapsNew identity-based society oriented signature schemes from pairings on elliptic curvesA pairing-based publicly verifiable secret sharing schemeAn ID-based multi-signer universal designated multi-verifier signature schemeProvably secure non-interactive key distribution based on pairingsA taxonomy of pairing-friendly elliptic curvesAn Efficient ID-Based Proxy Signature Scheme from PairingsOne-Round ID-Based Blind Signature Scheme without ROS AssumptionIdentity-based trapdoor mercurial commitments and applicationsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesFinding Invalid Signatures in Pairing-Based BatchesAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsAttribute-based key-insulated signature and its applicationsMulti-key Hierarchical Identity-Based SignaturesSecure administration of cryptographic role-based access control for large-scale cloud storage systemsMutative Identity-Based Signatures or Dynamic Credentials Without Random OraclesPractical Short Signature Batch VerificationID-Based Blind Signature and Proxy Blind Signature without Trusted PKGA Schnorr-Like Lightweight Identity-Based Signature SchemeIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionIdentity-Based Deterministic Signature Scheme without Forking-LemmaSecurity proofs for identity-based identification and signature schemesIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionIdentity-based signatures in standard modelOn Constructing Families of Pairing-Friendly Elliptic Curves with Variable DiscriminantA Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue SchemeBlack-box constructions of signature schemes in the bounded leakage settingOn the Security of Online/Offline Signatures and Multisignatures from ACISP’06A group key agreement protocol from pairingsCertificateless signature and proxy signature schemes from bilinear pairingsDigital SignaturesAsymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fieldsOn Dynamic Distribution of Private Keys over MANETsProvably secure arbitrated-quantum signature