Certificateless signcryption scheme in the standard model
暂无分享,去创建一个
Yupu Hu | Hua Ma | Zhenhua Liu | Xiangsong Zhang | Yu-pu Hu | Zhenhua Liu | Xiangsong Zhang | Hua Ma
[1] Shanshan Duan,et al. Certificateless undeniable signature scheme , 2008, Inf. Sci..
[2] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[3] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[4] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[5] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[6] Alexander W. Dent,et al. A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.
[7] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[8] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[9] Zhenfu Cao,et al. Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..
[10] Kyung-Ah Shim,et al. Breaking the short certificateless signature scheme , 2009, Inf. Sci..
[11] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[12] Jonathan Katz,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[13] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[16] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[17] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[18] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[19] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Chik How Tan,et al. Secure public-key encryption scheme without random oracles , 2008, Inf. Sci..
[22] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[23] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[24] Yupu Hu,et al. Secure Proxy Multi-signature Scheme in the Standard Model , 2008, ProvSec.
[25] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[26] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[27] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[28] Fagen Li,et al. An Improved Certificateless Signature Scheme Secure in the Standard Model , 2008, Fundam. Informaticae.
[29] Ricardo Dahab,et al. Two Notes on the Security of Certificateless Signatures , 2007, ProvSec.
[30] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[31] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[32] Joseph K. Liu,et al. Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model , 2007, IACR Cryptol. ePrint Arch..
[33] Kefei Chen,et al. Certificateless threshold cryptosystem secure against chosen-ciphertext attack , 2007, Inf. Sci..
[34] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[35] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[36] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.