On security of a Certificateless Hybrid Signcryption Scheme
暂无分享,去创建一个
[1] Nigel P. Smart,et al. On Computing Products of Pairings , 2006, IACR Cryptol. ePrint Arch..
[2] Dan Boneh,et al. Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.
[3] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[4] Yvo Desmedt,et al. A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.
[5] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Marko Hölbl,et al. An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..
[8] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[9] Ingrid Verbauwhede,et al. Teaching HW/SW Co-Design With a Public Key Cryptography Application , 2013, IEEE Transactions on Education.
[10] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[11] K. C. Reddy,et al. Signcryption scheme for Identity-based Cryptosystems , 2003, IACR Cryptol. ePrint Arch..
[12] Germán Sáez,et al. Signcryption schemes with threshold unsigncryption, and applications , 2014, Des. Codes Cryptogr..
[13] Caixue Zhou,et al. Provable certificateless generalized signcryption scheme , 2014, Des. Codes Cryptogr..
[14] Mohsen Guizani,et al. An enhanced public key infrastructure to secure smart grid wireless communication networks , 2014, IEEE Network.
[15] C. Pandu Rangan,et al. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.
[16] Robert H. Deng,et al. Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..
[17] Ming Zhu,et al. Authentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment , 2014, J. Networks.
[18] Yiliang Han,et al. BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.
[19] Liqun Chen,et al. An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction , 2006, IACR Cryptol. ePrint Arch..
[20] C. Pandu Rangan,et al. On the Security of Certificateless Signcryption Schemes , 2009 .
[21] C. Pandu Rangan,et al. Security Weaknesses in Two Certificateless Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..
[22] Jingang Zhang,et al. On the security of a certificateless signcryption scheme , 2014 .
[23] Fagen Li,et al. Certificateless hybrid signcryption , 2009, Math. Comput. Model..
[24] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[25] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[26] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[27] Zhixiong Chen,et al. A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.
[28] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .