Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Split Knowledge Generation of RSA Parameters
Proceedings of the 6th IMA International Conference on Cryptography and Coding
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Certification of Public Keys within an Identity Based System
ISC '02 Proceedings of the 5th International Conference on Information Security
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Hardware Implementation of Finite Fields of Characteristic Three
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Authenticating tripartite key agreement protocol with pairings
Journal of Computer Science and Technology
Robust ID-based threshold signcryption scheme from pairings
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Anonymous traceable disclosure scheme using pairing over elliptic curve
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management
An efficient identity-based signature scheme with batch verifications
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Multi-signatures in the plain public-Key model and a general forking lemma
Proceedings of the 13th ACM conference on Computer and communications security
A novel proxy key generation protocol and its application
Computer Standards & Interfaces
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Secure pseudonym management using mediated identity-based encryption
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Certificateless undeniable signature scheme
Information Sciences: an International Journal
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
The power of identification schemes
International Journal of Applied Cryptography
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
An efficient and secure pairing-based fair blind signature scheme with message recovery
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A verifiably encrypted signature scheme with strong unforgeability
Proceedings of the 2nd international conference on Scalable information systems
Information Sciences: an International Journal
ID-based one-pass authenticated key establishment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Proceedings of the 5th international conference on Pervasive services
Identity Based Multisignatures
Informatica
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature
Computational Intelligence and Security
A More Natural Way to Construct Identity-Based Identification Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Certified E-Mail Protocol in the ID-Based Setting
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Mediated Certificateless Signatures
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
Identity based signcryption scheme without random oracles
Computer Standards & Interfaces
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Hash Functions from Sigma Protocols and Improvements to VSH
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Design of DL-based certificateless digital signatures
Journal of Systems and Software
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
Information Security and Cryptology --- ICISC 2008
Strongly Unforgeable ID-Based Signatures without Random Oracles
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Practical Short Signature Batch Verification
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
A Schnorr-Like Lightweight Identity-Based Signature Scheme
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
An efficient secure proxy verifiably encrypted signature scheme
Journal of Network and Computer Applications
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Identity-Based Verifiably Encrypted Signatures without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
A wireless mesh network authentication method based on identity based signature
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An efficient ID-based verifiably encrypted signature scheme based on Hess's scheme
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Identity-based key issuing without secure channel in a broad area
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Mutative identity-based signatures or dynamic credentials without random oracles
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
A practical identity-based signature scheme from bilinear map
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Proxy signatures secure against proxy key exposure
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Strongly unforgeable ID-based signatures without random oracles
International Journal of Applied Cryptography
An opportunistic batch bundle authentication scheme for energy constrained DTNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
An ID-based aggregate signature scheme with constant pairing computations
Journal of Systems and Software
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
FPGA based implementation of parallel ECC processor
Proceedings of the 2011 International Conference on Communication, Computing & Security
Construction of identity based signcryption schemes
WISA'10 Proceedings of the 11th international conference on Information security applications
ID-based multi-proxy multi-signature scheme from bilinear pairing
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
Short and efficient certificate-based signature
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
An ID-based proxy multi signature scheme without bilinear pairings
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
A novel electronic cash system with trustee-based anonymity revocation from pairing
Electronic Commerce Research and Applications
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
An ID-based optimistic fair signature exchange protocol from pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An identity-based threshold signcryption scheme with semantic security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Group signature where group manager, members and open authority are identity-based
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Two proxy signcryption schemes from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ID-Based signature scheme without trusted PKG
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Efficient authentication of electronic document workflow
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ID-Based threshold unsigncryption scheme from pairings
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A remark on implementing the weil pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Identity-Based threshold proxy signature scheme with known signers
TAMC'06 Proceedings of the Third international conference on Theory and Applications of Models of Computation
Security analysis and improvement for key issuing schemes in ID-Based cryptography
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Java implementation for pairing-based cryptosystems
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Proxy structured multisignature scheme from bilinear pairings
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Cryptosystems based on elliptic curve pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Identity based conference key distribution scheme from parings
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Provable security of ID-Based proxy signature schemes
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Efficient revocation of security capability in certificateless public key cryptography
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
(SE-33)Intelligent ID-Based threshold system by an encryption and decryption from bilinear pairing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Tripartite key exchange in the canetti-krawczyk proof model
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient provably secure restrictive partially blind signatures from bilinear pairings
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
The power of identification schemes
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Identity-Based multi-signatures from RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Identity-Based aggregate and verifiably encrypted signatures from bilinear pairing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
A general construction for simultaneous signing and encrypting
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
On the joint security of encryption and signature, revisited
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
An efficient security framework for mobile WiMAX
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A private online system for executing wills based on a secret sharing mechanism
Security and Communication Networks
Generalized first pre-image tractable random oracle model and signature schemes
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Proceedings of the 2012 ACM conference on Computer and communications security
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Combined public-key schemes: the case of ABE and ABS
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Efficient escrow-free identity-based signature
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Security and Communication Networks
Efficient and robust identity-based handoff authentication in wireless networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Galindo-Garcia identity-based signature revisited
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Dispatch: secure, resilient mobile reporting
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Efficient hierarchical identity-based signatures from lattices
International Journal of Electronic Security and Digital Forensics
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Identity-based chameleon hashing and signatures without key exposure
Information Sciences: an International Journal
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Hi-index | 0.00 |
We develop an efficient identity based signature scheme based on pairings whose security relies on the hardness of the Diffie-Hellman problem in the random oracle model. We describe how this scheme is obtained as a special version of a more general generic scheme which yields further new provably secure identity based signature schemes if pairings are used. The generic scheme also includes traditional public key signature schemes. We further discuss issues of key escrow and the distribution of keys to multiple trust authorities. The appendix contains a brief description of the relevant properties of supersingular elliptic curves and the Weil and Tate pairings.