Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Two Certificateless Aggregate Signatures From Bilinear Maps
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Certificate-based fair exchange protocol of signatures from pairings
Computer Networks: The International Journal of Computer and Telecommunications Networking
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ID-Based aggregate signatures from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An efficient certificateless signature scheme
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Novel Efficient Certificateless Aggregate Signatures
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Certificateless multi-proxy signature
Computer Communications
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
Cryptanalysis of a certificateless multi-proxy signature scheme
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Certificateless undeniable signatures from bilinear maps
Information Sciences: an International Journal
An efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Insecurity of an efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
Hi-index | 0.24 |
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes. Then we give an efficient certificateless aggregate signature scheme. Our scheme is existentially unforgeable under adaptive chosen-message attacks assuming the computational Diffie-Hellman problem is hard.