Self-generated-certificate public key encryption without pairing and its application
暂无分享,去创建一个
Kefei Chen | Junzuo Lai | Weidong Kou | W. Kou | Junzuo Lai | Kefei Chen
[1] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[2] Shanshan Duan,et al. Certificateless undeniable signature scheme , 2008, Inf. Sci..
[3] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[4] Yiu-ming Cheung,et al. Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.
[5] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[6] Takeshi Koshiba,et al. More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.
[7] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[8] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[9] Byoungcheon Lee,et al. Self-Certificate: PKI using Self-Certified Key , 2000 .
[10] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[11] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[14] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[15] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[18] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[19] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[20] Colin Boyd,et al. Security-Mediated Certificateless Cryptography , 2006, Public Key Cryptography.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Guang Gong,et al. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks , 2006, ADHOC-NOW.
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.
[25] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[26] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[27] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[28] Zhenfu Cao,et al. Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..
[29] Kyung-Ah Shim,et al. Breaking the short certificateless signature scheme , 2009, Inf. Sci..
[30] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[31] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[32] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[33] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[34] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[35] Ljupco Kocarev,et al. Public-key encryption with chaos. , 2004, Chaos.
[36] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[37] Yi Mu,et al. Certificateless Designated Verifier Signature Schemes , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[38] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[39] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[40] Kefei Chen,et al. Certificateless threshold cryptosystem secure against chosen-ciphertext attack , 2007, Inf. Sci..
[41] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[42] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[43] Ranjan Bose,et al. Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.
[44] Jianhua Li,et al. Provable Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[45] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[46] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.