Confidential Signatures and Deterministic Signcryption (original) (raw)

The Joint Signature and Encryption Revisited ∗

Laila El Aimani

2013

View PDFchevron_right

Formal Proofs for the Security of Signcryption

Ron Steinfeld

Journal of Cryptology, 2007

View PDFchevron_right

Security of verifiably encrypted signatures and a construction without random oracles

Dominique Schröder

Pairing-Based Cryptography–Pairing 2009, 2009

View PDFchevron_right

Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs–preliminary draft–

Dominique Schröder

eprint.iacr.org

View PDFchevron_right

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs

Dominique Schröder

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles

Jayaprakash Kar

2015

View PDFchevron_right

A New Signature Scheme without Random Oracles and Its Applications

Willy Susilo

2008

View PDFchevron_right

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme

Cuong Trinh

Information

View PDFchevron_right

Efficient Sanitizable Signatures Without Random Oracles

Sherman S.M. Chow

Computer Security – ESORICS 2016, 2016

View PDFchevron_right

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability

Willy Susilo

International Journal of Information Security, 2011

View PDFchevron_right

Signatures Without Random Oracles or Non-Black Box Assumptions

Jean-jacques Quisquater

2006

View PDFchevron_right

Signature Schemes Secure Against Hard-to-Invert Leakage

Carmit Hazay

Journal of Cryptology, 2015

View PDFchevron_right

Anonymous Signatures Revisited

Vishal Saraswat

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Provable Secure Identity Based Signcryption Schemes without Random Oracles

Sunder Lal

International Journal of Network Security & Its Applications, 2012

View PDFchevron_right

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

Bogdan Warinschi

Lecture Notes in Computer Science, 2006

View PDFchevron_right

A Signature Scheme as Secure as the Diffie-Hellman Problem

Stanislaw Jarecki

Lecture Notes in Computer Science, 2003

View PDFchevron_right

On the Security of Certificateless Signcryption Schemes

sree vivek

View PDFchevron_right

A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model

mohammed hassouna

2016

View PDFchevron_right

Tightly-Secure Signatures from Chameleon Hash Functions

Olivier Blazy

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Unconditionally Secure Signatures

Erika Andersson

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs (Extended Abstract

Zulfikar Ramzan

View PDFchevron_right

Strong key-insulated signature schemes

Jonathan Katz

2002

View PDFchevron_right

On the Provable Security of Multi-Receiver Signcryption Schemes

Raga Gopalakrishnan

View PDFchevron_right

Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs

Zulfikar Ramzan

2005

View PDFchevron_right

Aggregate and verifiably encrypted signatures from multilinear maps without random oracles

Dominique Schröder

Advances in Information Security and Assurance, 2009

View PDFchevron_right

Ring Signatures: Stronger Definitions, and Constructions without Random Oracles

Jonathan Katz

Journal of Cryptology, 2009

View PDFchevron_right

Pseudorandom signatures

Mark Manulis

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13, 2013

View PDFchevron_right

Different Authentication Properties and a Signcryption Scheme Revisited

Olivier Markowitch

2009 International Conference on Computational Intelligence and Security, 2009

View PDFchevron_right

Formalizing Group Blind Signatures and Practical Constructions without Random Oracles

Essam Ghadafi

View PDFchevron_right

On the Security of Identity Based Ring Signcryption Schemes

sree vivek

Lecture Notes in Computer Science, 2009

View PDFchevron_right

On Generic Constructions of Designated Confirmer Signatures (The “Encryption of a Signature ” Paradigm Revisited)

Laila El Aimani

2012

View PDFchevron_right

Efficient Generalized Signcryption Schemes

Sunder Lal

Cryptology ePrint Archive, 2010

View PDFchevron_right