Confidential Signatures and Deterministic Signcryption (original) (raw)
Related papers
The Joint Signature and Encryption Revisited ∗
2013
Formal Proofs for the Security of Signcryption
Journal of Cryptology, 2007
Security of verifiably encrypted signatures and a construction without random oracles
Pairing-Based CryptographyPairing 2009, 2009
eprint.iacr.org
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Lecture Notes in Computer Science, 2010
Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles
2015
A New Signature Scheme without Random Oracles and Its Applications
2008
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme
Information
Efficient Sanitizable Signatures Without Random Oracles
Computer Security – ESORICS 2016, 2016
International Journal of Information Security, 2011
Signatures Without Random Oracles or Non-Black Box Assumptions
2006
Signature Schemes Secure Against Hard-to-Invert Leakage
Journal of Cryptology, 2015
Anonymous Signatures Revisited
Lecture Notes in Computer Science, 2009
Provable Secure Identity Based Signcryption Schemes without Random Oracles
International Journal of Network Security & Its Applications, 2012
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Lecture Notes in Computer Science, 2006
A Signature Scheme as Secure as the Diffie-Hellman Problem
Lecture Notes in Computer Science, 2003
On the Security of Certificateless Signcryption Schemes
A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
2016
Tightly-Secure Signatures from Chameleon Hash Functions
Lecture Notes in Computer Science, 2015
Unconditionally Secure Signatures
IACR Cryptol. ePrint Arch., 2016
Strong key-insulated signature schemes
2002
On the Provable Security of Multi-Receiver Signcryption Schemes
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs
2005
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles
Advances in Information Security and Assurance, 2009
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Journal of Cryptology, 2009
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13, 2013
Different Authentication Properties and a Signcryption Scheme Revisited
2009 International Conference on Computational Intelligence and Security, 2009
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles
On the Security of Identity Based Ring Signcryption Schemes
Lecture Notes in Computer Science, 2009
2012
Efficient Generalized Signcryption Schemes
Cryptology ePrint Archive, 2010