Tsaur, 2005 - Google Patents
Several security schemes constructed using ECC-based self-certified public key cryptosystemsTsaur, 2005
View PDF- Document ID
- 7729012828296419324
- Author
- Tsaur W
- Publication year
- Publication venue
- Applied Mathematics and Computation
External Links
Snippet
In this paper, we develop an efficient ECC-based self-certified public key cryptosystem (ECCSCPKC) quite suitable for efficiently securing electronic transactions. The proposed ECCSCPKC is constructed based on the elliptic curve cryptosystems (ECC) and the ID …
- 238000000034 method 0 description 5
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tan | A chaotic maps-based authenticated key agreement protocol with strong anonymity | |
Tsaur | Several security schemes constructed using ECC-based self-certified public key cryptosystems | |
Tanwar et al. | Efficient and secure multiple digital signature to prevent forgery based on ECC | |
Lu et al. | New (t, n) threshold directed signature scheme with provable security | |
Li et al. | A new self-certified signature scheme based on ntrus ing for smart mobile communications | |
Chou et al. | Improvement of Manik et al.¡¦ s remote user authentication scheme | |
Abdelfatah | A color image authenticated encryption using conic curve and Mersenne twister | |
Hwang et al. | Threshold Signatures: Current Status and Key Issues. | |
Dutta et al. | An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication | |
Hsu et al. | Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability | |
Han et al. | A pairing-based blind signature scheme with message recovery | |
Sahana et al. | A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance | |
Lin et al. | Efficient proxy signcryption scheme with provable CCA and CMA security | |
Ullah et al. | Blind signcryption scheme based on elliptic curves | |
Jeng et al. | An ECC-based blind signature scheme | |
Wu et al. | Threshold signature scheme using self-certified public keys | |
Ramasamy et al. | Digital Signature Scheme with Message Recovery Using Knapsack-based ECC. | |
Wu et al. | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | |
Liang et al. | Efficient and secure protocol in fair document exchange | |
He et al. | A new identity-based proxy blind signature scheme | |
Chuang et al. | A secure non-interactive deniable authentication protocol with certificates based on elliptic curve cryptography | |
Thadvai et al. | A novel authenticated encryption scheme with convertibility | |
Canard et al. | Group signatures are suitable for constrained devices | |
Chandrasekar et al. | Improved authentication and key agreement protocol using elliptic curve cryptography | |
Bashir et al. | Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields |