An Identity-Based Signature from Gap Diffie-Hellman Groups
From MaRDI portal
Publication:4414695
DOI10.1007/3-540-36288-6_2zbMath1033.94554OpenAlexW2112914778MaRDI QIDQ4414695
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_2
elliptic curvepublic key cryptographyWeil pairingID-based signatureGDH groupgap Diffie-Hellman groups
Related Items
A new ID-based proxy multi-signature scheme from bilinear pairings ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ Blockchain-based system for secure outsourcing of bilinear pairings ⋮ Chosen ciphertext secure authenticated group communication using identity-based signcryption ⋮ Efficient traceable ring signature scheme without pairings ⋮ Batch verification of short signatures ⋮ Forward-secure revocable identity-based encryption ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Two Notes on the Security of Certificateless Signatures ⋮ Traceable Identity-Based Group Signature ⋮ An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Efficient IBS from a new assumption in the multivariate-quadratic setting ⋮ Identity-based chameleon hashing and signatures without key exposure ⋮ Faster pairing computation on genus \(2\) hyperelliptic curves ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ An efficient identity based generalized signcryption scheme ⋮ Efficient algorithms for secure outsourcing of bilinear pairings ⋮ Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\) ⋮ Identity-based deniable authentication for ad hoc networks ⋮ Simplified small exponent test for batch verification ⋮ Indifferentiable deterministic hashing to elliptic and hyperelliptic curves ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ New identity-based society oriented signature schemes from pairings on elliptic curves ⋮ A pairing-based publicly verifiable secret sharing scheme ⋮ An ID-based multi-signer universal designated multi-verifier signature scheme ⋮ Provably secure non-interactive key distribution based on pairings ⋮ A taxonomy of pairing-friendly elliptic curves ⋮ An Efficient ID-Based Proxy Signature Scheme from Pairings ⋮ One-Round ID-Based Blind Signature Scheme without ROS Assumption ⋮ Identity-based trapdoor mercurial commitments and applications ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Finding Invalid Signatures in Pairing-Based Batches ⋮ An identity-based strongly unforgeable signature without random oracles from bilinear pairings ⋮ Attribute-based key-insulated signature and its applications ⋮ Multi-key Hierarchical Identity-Based Signatures ⋮ Secure administration of cryptographic role-based access control for large-scale cloud storage systems ⋮ Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles ⋮ Practical Short Signature Batch Verification ⋮ ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG ⋮ A Schnorr-Like Lightweight Identity-Based Signature Scheme ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Identity-Based Deterministic Signature Scheme without Forking-Lemma ⋮ Security proofs for identity-based identification and signature schemes ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Identity-based signatures in standard model ⋮ On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant ⋮ A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ On the Security of Online/Offline Signatures and Multisignatures from ACISP’06 ⋮ A group key agreement protocol from pairings ⋮ Certificateless signature and proxy signature schemes from bilinear pairings ⋮ Digital Signatures ⋮ Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields ⋮ On Dynamic Distribution of Private Keys over MANETs ⋮ Provably secure arbitrated-quantum signature