[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shim, 2020 - Google Patents

Security vulnerabilities of four signature schemes from NTRU lattices and pairings

Shim, 2020

View PDF
Document ID
7622857487798657386
Author
Shim K
Publication year
Publication venue
IEEE Access

External Links

Snippet

Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices. They proved that their …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes

Similar Documents

Publication Publication Date Title
Li et al. Hidden attribute-based signatures without anonymity revocation
Peng et al. Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing
Li et al. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Li et al. Attribute-based ring signatures
KR20030008183A (en) Method of id-based ring signature by using bilinear parings
Liu et al. Short and efficient certificate-based signature
Sun et al. Revocable identity-based signature without pairing
Wen et al. Secret handshakes from ID-based message recovery signatures: A new generic approach
Seo et al. Identity-based universal designated multi-verifiers signature schemes
Xia et al. Key replacement attack on two certificateless signature schemes without random oracles
Shim Security vulnerabilities of four signature schemes from NTRU lattices and pairings
Zhou et al. Certificate-based generalized ring signcryption scheme
Park et al. Certificateless public key encryption in the selective-ID security model (without random oracles)
Pakniat et al. Cryptanalysis of a certificateless aggregate signature scheme
Tian et al. Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Sayid et al. Certificateless public key cryptography: A research survey
Yanai et al. A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
Hassouna et al. A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model.
Swapna et al. Efficient identity based multi-signcryption scheme with public verifiability
Kumar et al. Insecurity of a secure certificate-based signature scheme
Hassouna et al. A strong and efficient Certificateless digital signature scheme
Islam et al. Design of an efficient ID-based short designated verifier proxy signature scheme
Shim Security analysis of various authentication schemes based on three types of digital signature schemes
Chen et al. Certificate-based proxy signature
Zheng et al. Threshold Attribute-Based Signcryption in Standard Model