Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
New directions in cryptography
IEEE Transactions on Information Theory
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Self-certified Signatures Based on Discrete Logarithms
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Efficient and Provably Secure Self-certified Signature Scheme
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Hi-index | 0.00 |
To overcome key escrow problems and secure channel problems that seem to be inherent to identity-based cryptography, here we propose a self-certified signature scheme (SCS) from pairings on elliptic curves. We also give a security model, and further provide a security proof in random oracle model. The scheme incorporates the advantages of self-certified public keys and pairings. Besides, it can also provide an implicit as well as mandatory verification of public keys.