Gu et al., 2008 - Google Patents
An efficient ID-based proxy signature scheme from pairingsGu et al., 2008
View PDF- Document ID
- 4853172041445514462
- Author
- Gu C
- Zhu Y
- Publication year
- Publication venue
- Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31-September 5, 2007, Revised Selected Papers 3
External Links
Snippet
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is only one, so our scheme is more efficient comparatively. The new scheme can be …
- 238000000034 method 0 abstract description 5
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baek et al. | Identity-based threshold decryption | |
Li et al. | Certificate-based signature: security model and efficient construction | |
Wu et al. | A new efficient certificateless signcryption scheme | |
Chow | Removing escrow from identity-based encryption: New security notions and key management techniques | |
Boneh et al. | Chosen-ciphertext security from identity-based encryption | |
Huang et al. | Efficient identity-based signatures and blind signatures | |
Sun et al. | Strongly secure certificateless public key encryption without pairing | |
Zhu et al. | An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | |
Seo et al. | Efficient certificateless proxy signature scheme with provable security | |
Chen et al. | New ID-based threshold signature scheme from bilinear pairings | |
Liu et al. | Efficient certificate-based encryption in the standard model | |
Gu et al. | An id-based verifiable encrypted signature scheme based on Hess’s scheme | |
Gu et al. | An efficient ID-based proxy signature scheme from pairings | |
Li et al. | Aggregate proxy signature and verifiably encrypted proxy signature | |
Gu et al. | Provable security of ID-based proxy signature schemes | |
Shao | Enhanced certificate-based encryption from pairings | |
Seo et al. | Identity-based universal designated multi-verifiers signature schemes | |
Zhou et al. | Certificate-based generalized ring signcryption scheme | |
Sun et al. | Identity-based on-line/off-line signcryption | |
Hu et al. | An efficient ID-based partially blind signature scheme | |
Zhang et al. | Certificateless signature and blind signature | |
Zhu et al. | An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | |
Lu et al. | Designing efficient proxy signature schemes for mobile communication | |
Sun et al. | Identity-based directed signature scheme from bilinear pairings | |
Luo et al. | A certificate-based signcryption scheme |