Simulatability and security of certificateless threshold signatures

From MaRDI portal
Publication:865909

DOI10.1016/j.ins.2006.08.008zbMath1125.94039OpenAlexW2077406089MaRDI QIDQ865909

Haifeng Qian, Zhen Fu Cao, Li-Cheng Wang, Xiang-Xue Li

Publication date: 20 February 2007

Published in: Information Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ins.2006.08.008




Related Items

SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREMCertificateless signcryption scheme in the standard modelEfficient elliptic curve scalar multiplication algorithms resistant to power analysisCertificateless threshold signature scheme from bilinear mapsGroup-oriented setting's multisigncryption scheme with threshold designcryptionEfficient certificateless proxy signature scheme with provable securityCertificateless proxy signature from RSAA novel elliptic curve scalar multiplication algorithm against power analysisNon-interactive identity-based threshold signature scheme without random oraclesCertificateless threshold signature secure in the standard modelCryptanalysis and improvement of a certificateless threshold signature secure in the standard modelCertificateless threshold cryptosystem secure against chosen-ciphertext attackHybrid proxy multisignature: a new type multi-party signatureConvertible multi-authenticated encryption schemeCertificateless undeniable signature schemeNew \((t, n)\) threshold directed signature scheme with provable securityA multisecret sharing scheme for color images based on cellular automataSelf-generated-certificate public key encryption without pairing and its applicationEfficient certificateless threshold signatures without random oraclesEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismCertificateless threshold ring signatureEfficient Certificateless Proxy Signature Scheme



Cites Work