Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428132
DOI10.1007/b11817zbMath1122.94356OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428132
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items (29)
A secure anonymous proxy signcryption scheme ⋮ Certificateless signcryption scheme in the standard model ⋮ Analysis of improved signcryption scheme with key privacy ⋮ On the security of joint signature and encryption revisited ⋮ An efficient signcryption for data access control in cloud computing ⋮ Certificate-based signcryption with enhanced security features ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Efficient proxy signcryption scheme with provable CCA and CMA security ⋮ A survey on functional encryption ⋮ Fully anonymous identity-based broadcast signcryption with public verification ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ Secure identity-based signcryption in the standard model ⋮ Applications of Signcryption ⋮ All-but-many encryption ⋮ Indifferentiable deterministic hashing to elliptic and hyperelliptic curves ⋮ Provably secure non-interactive key distribution based on pairings ⋮ Provable secure identity based generalized signcryption scheme ⋮ Identity Based Public Verifiable Signcryption Scheme ⋮ Signcryption from randomness recoverable public key encryption ⋮ A lattice-based signcryption scheme without random oracles ⋮ Deterministic Encoding into Twisted Edwards Curves ⋮ Efficient Identity-Based Signcryption in the Standard Model ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Efficient and Provably Secure Certificateless Multi-receiver Signcryption
This page was built for publication: Advances in Cryptology - CRYPTO 2003