<--- Back to Details
First PageDocument Content
Certificateless cryptography / Applied mathematics / Security / Digital signature / BLS / Key signature / RSA / Public-key cryptography / Cryptography / Cyberwarfare
Date: 2007-12-06 13:51:07
Certificateless cryptography
Applied mathematics
Security
Digital signature
BLS
Key signature
RSA
Public-key cryptography
Cryptography
Cyberwarfare

Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 269,46 KB

Share Document on Facebook

Similar Documents

Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

DocID: 16gzR - View Document

Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

DocID: 14ZuZ - View Document

Public-key cryptography / Key-agreement protocol / Information / Cyberwarfare / Computing / Cryptographic protocols / Certificateless cryptography / Diffie–Hellman key exchange

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

DocID: 12Q1X - View Document

Onion routing / Network architecture / Tor / Routing / Mix network / Certificateless cryptography / Internet privacy / Internet / Computing

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

DocID: 12NH7 - View Document

Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

DocID: 12JTe - View Document