Shim, 2020 - Google Patents
Security vulnerabilities of four signature schemes from NTRU lattices and pairingsShim, 2020
View PDF- Document ID
- 7622857487798657386
- Author
- Shim K
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices. They proved that their …
- 230000001010 compromised 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Hidden attribute-based signatures without anonymity revocation | |
Peng et al. | Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing | |
Li et al. | Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks | |
Li et al. | Attribute-based ring signatures | |
KR20030008183A (en) | Method of id-based ring signature by using bilinear parings | |
Liu et al. | Short and efficient certificate-based signature | |
Sun et al. | Revocable identity-based signature without pairing | |
Wen et al. | Secret handshakes from ID-based message recovery signatures: A new generic approach | |
Seo et al. | Identity-based universal designated multi-verifiers signature schemes | |
Xia et al. | Key replacement attack on two certificateless signature schemes without random oracles | |
Shim | Security vulnerabilities of four signature schemes from NTRU lattices and pairings | |
Zhou et al. | Certificate-based generalized ring signcryption scheme | |
Park et al. | Certificateless public key encryption in the selective-ID security model (without random oracles) | |
Pakniat et al. | Cryptanalysis of a certificateless aggregate signature scheme | |
Tian et al. | Cryptanalysis and improvement of a certificateless multi-proxy signature scheme | |
Sayid et al. | Certificateless public key cryptography: A research survey | |
Yanai et al. | A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. | |
Hassouna et al. | A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model. | |
Swapna et al. | Efficient identity based multi-signcryption scheme with public verifiability | |
Kumar et al. | Insecurity of a secure certificate-based signature scheme | |
Hassouna et al. | A strong and efficient Certificateless digital signature scheme | |
Islam et al. | Design of an efficient ID-based short designated verifier proxy signature scheme | |
Shim | Security analysis of various authentication schemes based on three types of digital signature schemes | |
Chen et al. | Certificate-based proxy signature | |
Zheng et al. | Threshold Attribute-Based Signcryption in Standard Model |