Simulatability and security of certificateless threshold signatures
From MaRDI portal
Publication:865909
DOI10.1016/j.ins.2006.08.008zbMath1125.94039OpenAlexW2077406089MaRDI QIDQ865909
Haifeng Qian, Zhen Fu Cao, Li-Cheng Wang, Xiang-Xue Li
Publication date: 20 February 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.08.008
Related Items
SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM ⋮ Certificateless signcryption scheme in the standard model ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ Certificateless proxy signature from RSA ⋮ A novel elliptic curve scalar multiplication algorithm against power analysis ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ Hybrid proxy multisignature: a new type multi-party signature ⋮ Convertible multi-authenticated encryption scheme ⋮ Certificateless undeniable signature scheme ⋮ New \((t, n)\) threshold directed signature scheme with provable security ⋮ A multisecret sharing scheme for color images based on cellular automata ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Certificateless threshold ring signature ⋮ Efficient Certificateless Proxy Signature Scheme
Cites Work
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Identity-Based Cryptosystems and Signature Schemes
- Information Security and Privacy
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Computational Science and Its Applications – ICCSA 2004
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item