Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428132

DOI10.1007/b11817zbMath1122.94356OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428132

Xavier Boyen

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (29)

A secure anonymous proxy signcryption schemeCertificateless signcryption scheme in the standard modelAnalysis of improved signcryption scheme with key privacyOn the security of joint signature and encryption revisitedAn efficient signcryption for data access control in cloud computingCertificate-based signcryption with enhanced security featuresOne-Round Attribute-Based Key Exchange in the Multi-party SettingCryptanalysis of a signcryption scheme with fast online signing and short signcryptextElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyEfficient proxy signcryption scheme with provable CCA and CMA securityA survey on functional encryptionFully anonymous identity-based broadcast signcryption with public verificationOne-Round Attribute-Based Key Exchange in the Multi-Party SettingGroup-oriented setting's multisigncryption scheme with threshold designcryptionReflections on the security proofs of Boneh-Franklin identity-based encryption schemeIdentity-based aggregate signcryption in the standard model from multilinear mapsSecure identity-based signcryption in the standard modelApplications of SigncryptionAll-but-many encryptionIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesProvably secure non-interactive key distribution based on pairingsProvable secure identity based generalized signcryption schemeIdentity Based Public Verifiable Signcryption SchemeSigncryption from randomness recoverable public key encryptionA lattice-based signcryption scheme without random oraclesDeterministic Encoding into Twisted Edwards CurvesEfficient Identity-Based Signcryption in the Standard ModelIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionEfficient and Provably Secure Certificateless Multi-receiver Signcryption






This page was built for publication: Advances in Cryptology - CRYPTO 2003