[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tsaur, 2005 - Google Patents

Several security schemes constructed using ECC-based self-certified public key cryptosystems

Tsaur, 2005

View PDF
Document ID
7729012828296419324
Author
Tsaur W
Publication year
Publication venue
Applied Mathematics and Computation

External Links

Snippet

In this paper, we develop an efficient ECC-based self-certified public key cryptosystem (ECCSCPKC) quite suitable for efficiently securing electronic transactions. The proposed ECCSCPKC is constructed based on the elliptic curve cryptosystems (ECC) and the ID …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Tan A chaotic maps-based authenticated key agreement protocol with strong anonymity
Tsaur Several security schemes constructed using ECC-based self-certified public key cryptosystems
Tanwar et al. Efficient and secure multiple digital signature to prevent forgery based on ECC
Lu et al. New (t, n) threshold directed signature scheme with provable security
Li et al. A new self-certified signature scheme based on ntrus ing for smart mobile communications
Chou et al. Improvement of Manik et al.¡¦ s remote user authentication scheme
Abdelfatah A color image authenticated encryption using conic curve and Mersenne twister
Hwang et al. Threshold Signatures: Current Status and Key Issues.
Dutta et al. An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication
Hsu et al. Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
Han et al. A pairing-based blind signature scheme with message recovery
Sahana et al. A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance
Lin et al. Efficient proxy signcryption scheme with provable CCA and CMA security
Ullah et al. Blind signcryption scheme based on elliptic curves
Jeng et al. An ECC-based blind signature scheme
Wu et al. Threshold signature scheme using self-certified public keys
Ramasamy et al. Digital Signature Scheme with Message Recovery Using Knapsack-based ECC.
Wu et al. A publicly verifiable PCAE scheme for confidential applications with proxy delegation
Liang et al. Efficient and secure protocol in fair document exchange
He et al. A new identity-based proxy blind signature scheme
Chuang et al. A secure non-interactive deniable authentication protocol with certificates based on elliptic curve cryptography
Thadvai et al. A novel authenticated encryption scheme with convertibility
Canard et al. Group signatures are suitable for constrained devices
Chandrasekar et al. Improved authentication and key agreement protocol using elliptic curve cryptography
Bashir et al. Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields