Yap et al., 2006 - Google Patents
An efficient certificateless signature schemeYap et al., 2006
View PDF- Document ID
- 11883313880552318919
- Author
- Yap W
- Heng S
- Goi B
- Publication year
- Publication venue
- Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedings
External Links
Snippet
Certificateless public key cryptography (CLPKC) is a paradi-gm to solve the inherent key escrow problem suffered by identity-based cryptography (IBC). While certificateless signature is one of the most important security primitives in CLPKC, there are relatively few …
- 238000010276 construction 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yap et al. | An efficient certificateless signature scheme | |
Liu et al. | Certificateless signcryption scheme in the standard model | |
Li et al. | Certificate-based signature: security model and efficient construction | |
Hu et al. | Certificateless signature: a new security model and an improved generic construction | |
Xu et al. | ID-based proxy signature using bilinear pairings | |
Chen | A DAA scheme requiring less TPM resources | |
Hohenberger et al. | Short and stateless signatures from the RSA assumption | |
Yoon et al. | Batch verifications with ID-based signatures | |
Camenisch et al. | An accumulator based on bilinear maps and efficient revocation for anonymous credentials | |
Brickell et al. | Simplified security notions of direct anonymous attestation and a concrete scheme from pairings | |
Huang et al. | Certificateless signatures: new schemes and security models | |
Chow et al. | Ring signatures without random oracles | |
Huang et al. | Efficient identity-based signatures and blind signatures | |
Chang et al. | RKA security for identity-based signature scheme | |
Brickell et al. | Enhanced privacy ID from bilinear pairing | |
Cao et al. | A secure identity-based multi-proxy signature scheme | |
Zhu et al. | An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | |
Seo et al. | Efficient certificateless proxy signature scheme with provable security | |
Tso et al. | Efficient and short certificateless signature | |
Hwang et al. | Certificateless public key encryption secure against malicious KGC attacks in the standard model | |
Zhang et al. | Delegation of signing rights using certificateless proxy signatures | |
Tso et al. | Efficient and short certificateless signatures secure against realistic adversaries | |
Yang et al. | Analysis and improvement of a signcryption scheme with key privacy | |
Canard et al. | List signature schemes | |
Li et al. | Aggregate proxy signature and verifiably encrypted proxy signature |