ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet
ICC 2021 - IEEE International Conference on Communications
◽
10.1109/icc42927.2021.9500446
◽
2021
◽
Author(s):
Zhikang Xie
◽
Qingni Shen
◽
Cong Li
◽
Jisheng Dong
◽
Yuejian Fang
Keyword(s):
Mobile Internet
◽
Random Oracles
◽
Identity Based
◽
Chameleon Hash
Download Full-text
Related Documents
Cited By
References
An identity-based strongly unforgeable signature without random oracles from bilinear pairings
Information Sciences
◽
10.1016/j.ins.2014.02.041
◽
2014
◽
Vol 276
◽
pp. 1-9
◽
Cited By ~ 4
Author(s):
Saeran Kwon
Keyword(s):
Bilinear Pairings
◽
Random Oracles
◽
Identity Based
Download Full-text
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles
2013 5th International Conference on Intelligent Networking and Collaborative Systems
◽
10.1109/incos.2013.107
◽
2013
◽
Cited By ~ 1
Author(s):
Zhenhua Liu
◽
Xiangsong Zhang
◽
Tsuyoshi Takagi
Keyword(s):
Signature Scheme
◽
Random Oracles
◽
Identity Based
Download Full-text
Identity-Based Encryption with Random Oracles
Introduction to Security Reduction
◽
10.1007/978-3-319-93049-7_9
◽
2018
◽
pp. 215-227
Author(s):
Fuchun Guo
◽
Willy Susilo
◽
Yi Mu
Keyword(s):
Random Oracles
◽
Identity Based Encryption
◽
Identity Based
Download Full-text
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
Cryptology and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-76969-9_1
◽
2007
◽
pp. 1-14
◽
Cited By ~ 3
Author(s):
Fuchun Guo
◽
Yi Mu
◽
Zhide Chen
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
Public-Key Cryptography – PKC 2016 - Lecture Notes in Computer Science
◽
10.1007/978-3-662-49384-7_10
◽
2016
◽
pp. 255-279
◽
Cited By ~ 7
Author(s):
Yohei Watanabe
◽
Junji Shikata
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
Lecture Notes in Computer Science - Security and Cryptography for Networks
◽
10.1007/11832072_12
◽
2006
◽
pp. 173-185
◽
Cited By ~ 5
Author(s):
David Galindo
◽
Eike Kiltz
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Secure Hierarchical Identity-Based Identification without Random Oracles
Lecture Notes in Computer Science - Information Security
◽
10.1007/978-3-642-33383-5_16
◽
2012
◽
pp. 258-273
◽
Cited By ~ 2
Author(s):
Atsushi Fujioka
◽
Taiichi Saito
◽
Keita Xagawa
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Fully CCA2 secure identity based broadcast encryption without random oracles
Information Processing Letters
◽
10.1016/j.ipl.2009.01.017
◽
2009
◽
Vol 109
(11)
◽
pp. 527-533
◽
Cited By ~ 31
Author(s):
Yanli Ren
◽
Dawu Gu
Keyword(s):
Broadcast Encryption
◽
Random Oracles
◽
Identity Based
Download Full-text
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
Progress in Cryptology - INDOCRYPT 2006 - Lecture Notes in Computer Science
◽
10.1007/11941378_29
◽
2006
◽
pp. 409-423
◽
Cited By ~ 10
Author(s):
Jian Weng
◽
Shengli Liu
◽
Kefei Chen
◽
Changshe Ma
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Topics in Cryptology – CT-RSA 2008 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-79263-5_13
◽
2008
◽
pp. 203-220
◽
Cited By ~ 11
Author(s):
Jian Weng
◽
Shengli Liu
◽
Kefei Chen
◽
Dong Zheng
◽
Weidong Qiu
Keyword(s):
Random Oracles
◽
Identity Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close