Research on Certificateless Public Key Cryptography
暂无分享,去创建一个
Zhang Lei | Zhang Fu-tai | Sun Yin-Xia | Geng Man-Man | LI Su-Juan | L Zhang | Futai Zhang | Zhang Lei | Yinxia Sun | Sujuan Li | Manman Geng | L. Zhang
[1] Kefei Chen,et al. Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism , 2010, Inf. Sci..
[2] C. Pandu Rangan,et al. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.
[3] Kefei Chen,et al. Practical Certificateless Aggregate Signatures from Bilinear Maps , 2008, J. Inf. Sci. Eng..
[4] Joseph K. Liu,et al. Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model , 2007, IACR Cryptol. ePrint Arch..
[5] Kefei Chen,et al. Certificateless threshold cryptosystem secure against chosen-ciphertext attack , 2007, Inf. Sci..
[6] Robert H. Deng,et al. Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..
[7] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[8] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[9] Kenneth G. Paterson,et al. An Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[10] C. Pandu Rangan,et al. A note on the Certificateless Multi-receiver Signcryption Scheme , 2009, IACR Cryptol. ePrint Arch..
[11] Je Hong Park,et al. An attack on the certificateless signature scheme from EUC Workshops 2006 , 2006, IACR Cryptol. ePrint Arch..
[12] Yanhua Hao,et al. Cryptanalysis and Improvements of Two Certificateless Signature Schemes with Additional Properties , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[13] Jianhua Li,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.
[14] Zhenfu Cao,et al. Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..
[15] Lei Zhang,et al. Novel Efficient Certificateless Aggregate Signatures , 2009, AAECC.
[16] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[17] Xu An Wang,et al. Further Observations on Certificateless Public Key Encryption , 2009, Inscrypt.
[18] Fagen Li,et al. Certificateless threshold signature secure in the standard model , 2013, Inf. Sci..
[19] Zhang Fu. Certificateless Proxy Signature Scheme with Provable Security , 2009 .
[20] Qiong Huang,et al. Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.
[21] Qiuliang Xu,et al. Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme , 2009, 2009 International Conference on Management of e-Commerce and e-Government.
[22] Joonsang Baek,et al. Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.
[23] Wei Wu,et al. A Provably Secure Ring Signature Scheme in Certificateless Cryptography , 2007, ProvSec.
[24] Li Ling,et al. General and Efficient Certificateless Public Key Encryption Constructions , 2007, Pairing.
[25] Bok-Min Goi,et al. Cryptanalysis of Some Proxy Signature Schemes Without Certificates , 2007, WISTP.
[26] Qiong Huang,et al. Generic Certificateless Key Encapsulation Mechanism , 2007, ACISP.
[27] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[28] C. Pandu Rangan,et al. Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.
[29] Yi Mu,et al. Cryptanalysis and improvement of an efficient certificateless signature scheme , 2008, Journal of Communications and Networks.
[30] Dengguo Feng,et al. Key Replacement Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[31] Jianfeng Ma,et al. Provable efficient certificateless group key exchange protocol , 2006, Wuhan University Journal of Natural Sciences.
[32] Kyung-Ah Shim,et al. Breaking the short certificateless signature scheme , 2009, Inf. Sci..
[33] Jian Weng,et al. Certificateless key-insulated signature without random oracles , 2009 .
[34] Zhenfu Cao,et al. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..
[35] Lei Zhang,et al. A new certificateless aggregate signature scheme , 2009, Comput. Commun..
[36] Futai Zhang,et al. An Improved secure certificateless authenticated group key agreement protocol , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[37] Dong Hoon Lee,et al. Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) , 2007, Pairing.
[38] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[39] Lei Zhang,et al. Security Model for Certificateless Aggregate Signature Schemes , 2008, 2008 International Conference on Computational Intelligence and Security.
[40] Colin Boyd,et al. Strongly Secure Certificateless Key Agreement , 2009, Pairing.
[41] Colleen M. Swanson,et al. Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .
[42] Jianhua Li,et al. Constructing Efficient Certificateless Public Key Encryption with Pairing , 2008, Int. J. Netw. Secur..
[43] David Jao,et al. A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.
[44] Meng Gao,et al. A Secure Certificateless Authenticated Group Key Agreement Protocol , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[45] Junzuo Lai,et al. Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.
[46] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[47] Richard Comley,et al. Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[48] Zhixiong Chen,et al. A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.
[49] Qiuliang Xu,et al. Constructing Secure Two-Party Authenticated Key Agreement Protocol Based on Certificateless Public Key Encryption Scheme , 2009, 2009 4th International Conference on Computer Science & Education.
[50] Qiuliang Xu,et al. Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol , 2009, 2009 Asia-Pacific Conference on Information Processing.
[51] Kwangjo Kim,et al. Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[52] Dong Hoon Lee,et al. Efficient Revocation of Security Capability in Certificateless Public Key Cryptography , 2005, KES.
[53] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[54] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[55] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[56] Xinyi Huang,et al. Efficient and Short Certificateless Signature , 2008, CANS.
[57] Dengguo Feng,et al. On the Security of a Certificateless Public-Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[58] Yi Mu,et al. Malicious KGC Attack in Certificateless Cryptography , 2006 .
[59] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[60] Kee-Young Yoo,et al. A Certificateless Authenticated Group Key Agreement Protocol Providing Forward Secrecy , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.
[61] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[62] Yuqing Zhang,et al. A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[63] Qiu-Liang Xu,et al. On the security of certificateless authenticated key agreement protocol , 2009, 2009 IEEE International Symposium on IT in Medicine & Education.
[64] Willy Susilo,et al. Cryptanalysis on Two Certificateless Signature Schemes , 2010, Int. J. Comput. Commun. Control.
[65] Rosario Gennaro,et al. Certificateless onion routing , 2009, CCS.
[66] Colin Boyd,et al. Efficient Certificateless KEM in the Standard Model , 2009, ICISC.
[67] Young-Ran Lee,et al. An Authenticated Certificateless Public Key Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[68] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[69] Lei Zhang,et al. New Efficient Certificateless Signature Scheme , 2007, EUC Workshops.
[70] Eike Kiltz,et al. Compact CCA-Secure Encryption for Messages of Arbitrary Length , 2009, Public Key Cryptography.
[71] Chen Hu,et al. Certificateless Aggregate Signature Scheme , 2010, 2010 International Conference on E-Business and E-Government.
[72] Fagen Li,et al. Certificateless hybrid signcryption , 2009, Math. Comput. Model..
[73] Lei Zhang,et al. Certificateless signature and blind signature , 2008 .
[74] Lein Harn,et al. Design of DL-based certificateless digital signatures , 2009, J. Syst. Softw..
[75] Lei Zhang,et al. Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[76] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[77] Fagen Li,et al. Simulatability and Security of Certificateless Threshold Signatures without Random Oracles , 2008, 2008 International Conference on Computational Intelligence and Security.
[78] Kenneth G. Paterson,et al. CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.
[79] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[80] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[81] Shanshan Duan,et al. Certificateless undeniable signature scheme , 2008, Inf. Sci..
[82] Guoyan Zhang,et al. Certificateless threshold decryption scheme secure in the standard model , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[83] Xiangxue Li,et al. Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .
[84] Zhang Zhang,et al. Efficient and provably secure certificateless signcryption from bilinear maps , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[85] Chun-I Fan,et al. Cryptanalysis on Du-Wen Certificateless Short Signature Scheme , 2009 .
[86] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[87] Meng Gao,et al. An Efficient Certificateless Authenticated Tripartite Key Agreement Protocol , 2009, 2009 International Conference on Management and Service Science.
[88] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[89] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[90] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[91] Yi Mu,et al. Certificateless Threshold Ring Signature , 2009, Inf. Sci..
[92] Wang Shengbao,et al. Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.
[93] Liang Xia,et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 , 2008, Wuhan University Journal of Natural Sciences.
[94] Sherman S. M. Chow,et al. Certificateless Ring Signatures , 2007, IACR Cryptol. ePrint Arch..
[95] Shaozhen Chen,et al. A Concrete Certificateless Signature Scheme without Pairings , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[96] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[97] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[98] Rui Zhang,et al. An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..
[99] Sattam S. Al-Riyami. Cryptographic schemes based on elliptic curve pairings , 2004 .
[100] C. Pandu Rangan,et al. Certificateless KEM and Hybrid Signcryption Schemes Revisited , 2010, ISPEC.
[101] C. Pandu Rangan,et al. CCA secure certificateless encryption schemes based on RSA , 2011, Proceedings of the International Conference on Security and Cryptography.
[102] Paulo S. L. M. Barreto,et al. Toward Efficient Certificateless Signcryption from (and without) Bilinear Pairings , 2008, Anais do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2008).
[103] Robert H. Deng,et al. RSA-Based Certificateless Public Key Encryption , 2009, ISPEC.
[104] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[105] Yi Mu,et al. Certificateless threshold signature scheme from bilinear maps , 2010, Inf. Sci..
[106] Qiong Huang,et al. Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model , 2010, Journal of Computer Science and Technology.
[107] Sun,et al. Secure Certificateless Encryption with Short Ciphertext , 2010 .
[108] Alexander W. Dent,et al. A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.
[109] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[110] Paz Morillo,et al. Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes , 2006, EuroPKI.
[111] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.
[112] Xiaolei Dong,et al. Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model , 2009, Inscrypt.
[113] Da Li,et al. Certificateless Signature Scheme without Random Oracles , 2009, ISA.
[114] Gao Meng,et al. Key-Compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[115] Rongbo Lu,et al. Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).