Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles (original) (raw)

Provably Secure Identity-Based Aggregate Signature Scheme

Jayaprakash Kar

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

View PDFchevron_right

ID based Agg Signcryption

Jayaprakash Kar

View PDFchevron_right

Provable Secure Identity Based Signcryption Schemes without Random Oracles

Sunder Lal

International Journal of Network Security & Its Applications, 2012

View PDFchevron_right

A Pairing Free Secure Identity-based Aggregate Signature Scheme Under Random Oracle

Dr Eman Abouelkheir

Informatica (Slovenia), 2018

View PDFchevron_right

Pairing free identity based aggregate signcryption scheme

Dr Eman Abouelkheir

IET Information Security, 2020

View PDFchevron_right

Identity-Based Aggregate and Multi-Signature Schemes Based on RSA

Stanislaw Jarecki

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Two Identity-Based Aggregate Signature Schemes from Pairings

Bubu Bhuyan

2018

View PDFchevron_right

Identity-Based Aggregate Signatures

Zulfikar Ramzan

2006

View PDFchevron_right

Identity-based multi-proxy multi-signature scheme provably secure in random oracle model

Sahadeo Padhye

Transactions on Emerging Telecommunications Technologies, 2013

View PDFchevron_right

Aggregate and verifiably encrypted signatures from multilinear maps without random oracles

Dominique Schröder

Advances in Information Security and Assurance, 2009

View PDFchevron_right

Identity Based Public Verifiable Signcryption Scheme

pandu adi

2010

View PDFchevron_right

An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

sree vivek

2009

View PDFchevron_right

On the Provable Security of Multi-Receiver Signcryption Schemes

Raga Gopalakrishnan

View PDFchevron_right

Signcryption scheme for Identity-based Cryptosystems

Divya Nalla

IACR Cryptol. ePrint Arch., 2003

View PDFchevron_right

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2005

View PDFchevron_right

An Efficient Signcryption Scheme from q-Diffie-Hellman Problems

Jayaprakash Kar

View PDFchevron_right

New identity based signcryption schemes from pairings

Jean-jacques Quisquater

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

On the Security of Identity Based Ring Signcryption Schemes

sree vivek

Lecture Notes in Computer Science, 2009

View PDFchevron_right

An efficient identity based generalized signcryption scheme

Sunder Lal

Theoretical Computer Science, 2011

View PDFchevron_right

Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

sree vivek

2009

View PDFchevron_right

A Signature Scheme as Secure as the Diffie-Hellman Problem

Stanislaw Jarecki

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Formal Proofs for the Security of Signcryption

Ron Steinfeld

Journal of Cryptology, 2007

View PDFchevron_right

On the Security of Certificateless Signcryption Schemes

sree vivek

View PDFchevron_right

Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs *

Shih-Kun Huang

Journal of Information Science and Engineering, 2012

View PDFchevron_right

Efficient Generalized Signcryption Schemes

Sunder Lal

Cryptology ePrint Archive, 2010

View PDFchevron_right

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme

Sunder Lal

Arxiv preprint arXiv:0909.1412, 2009

View PDFchevron_right

Non-interactive multisignatures in the plain public-key model with efficient verification

Shouhuai Xu

2010

View PDFchevron_right

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme

Cuong Trinh

Information

View PDFchevron_right

ID based generalized signcryption

Sunder Lal

Cryptology ePprint Archive, Report, 2008

View PDFchevron_right

An ID-Based Public key Cryptosystem based on the Double Discrete Logarithm Problem

DR SHYAM SUNDAR AGRAWAL

2010

View PDFchevron_right

Signcryption in Hierarchical Identity Based Cryptosystem

Sherman S.M. Chow

2005

View PDFchevron_right

Practical hierarchical identity based encryption and signature schemes without random oracles

Man Ho Au

2006

View PDFchevron_right

A New Signature Scheme without Random Oracles and Its Applications

Willy Susilo

2008

View PDFchevron_right

Certificateless Aggregate Signature Schemes with Improved Security

Viet Nguyen Quoc

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015

View PDFchevron_right

SECURITY EVALUATION OF AN ORDER-SPECIFIED, IDENTITY-BASED AGGREGATE SIGNATURE SCHEME

Sdiwc Conferences

View PDFchevron_right