Sign-then-encrypt with security enhancement and compressed ciphertext
From MaRDI portal
Publication:6658310
DOI10.1016/J.TCS.2024.115006MaRDI QIDQ6658310
Publication date: 8 January 2025
Published in: Theoretical Computer Science (Search for Journal in Brave)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to construct efficient signcryption schemes on elliptic curves
- Formal proofs for the security of signcryption
- Lattice-based signcryption without random oracles
- A constructive perspective on signcryption security
- Secure integration of asymmetric and symmetric encryption schemes
- Signcryption from randomness recoverable public key encryption
- Signcryption with non-interactive non-repudiation
- Security Proofs for Signature Schemes
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
- On the Joint Security of Encryption and Signature, Revisited
- Generic Constructions for Verifiable Signcryption
- Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
- Functional Signcryption: Notion, Construction, and Applications
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
- Efficient Constructions of Signcryption Schemes and Signcryption Composability
- A public key cryptosystem and a signature scheme based on discrete logarithms
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity Based Public Verifiable Signcryption Scheme
- Secure integration of asymmetric and symmetric encryption schemes
- ID Based Signcryption Scheme in Standard Model
- Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Advances in Cryptology - CRYPTO 2003
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Information Security and Privacy
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2006
This page was built for publication: Sign-then-encrypt with security enhancement and compressed ciphertext
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6658310)