Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A Certificateless Restrictive Partially Blind Signature Scheme
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
Certificateless Partially Blind Signatures
ICISE '09 Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures"
Electronic Commerce Research and Applications
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
We extend the partially-blind signature approach into certificateless public key cryptography to eliminate the key escrow problem that occurs with identities in public key cryptography. We also formalize conditions for security for certificateless partially-blind signature schemes. We also present a practical certificateless partially-blind signature scheme to make electronic cash untraceable. We prove the scheme to be unforgeable in the face of message attacks under the computational Diffie-Hellman assumption.