Zhang et al., 2009 - Google Patents
An efficient certificate-based signature scheme without pairingsZhang et al., 2009
- Document ID
- 17002052326768500177
- Author
- Zhang J
- Chen H
- Geng Q
- Publication year
- Publication venue
- 2009 Second International Workshop on Computer Science and Engineering
External Links
Snippet
Certificate-based cryptography solves certificate revocation problem and eliminate third- party queries in the traditional PKI and avoid key escrow in the ID-based cryptography. It is a better alternative for the traditional public key system. In this paper, we proposed an efficient …
- 238000000034 method 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Certificate-based signature: security model and efficient construction | |
Liu et al. | Certificate-based signature schemes without pairings or random oracles | |
Li et al. | Hidden attribute-based signatures without anonymity revocation | |
Huang et al. | Certificateless signatures: new schemes and security models | |
Au et al. | Certificate based (linkable) ring signature | |
Wu et al. | A new efficient certificateless signcryption scheme | |
US8225098B2 (en) | Direct anonymous attestation using bilinear maps | |
He et al. | An efficient certificateless designated verifier signature scheme. | |
Liu et al. | Short and efficient certificate-based signature | |
Chow et al. | Identity based ring signature: Why, how and what next | |
Zhang | On the security of a certificate-based signature scheme and its improvement with pairings | |
Yuen et al. | How to construct identity-based signatures without the key escrow problem | |
Liu et al. | Efficient certificate-based encryption in the standard model | |
Islam et al. | Certificateless strong designated verifier multisignature scheme using bilinear pairings | |
Seo et al. | Identity-based universal designated multi-verifiers signature schemes | |
Liu et al. | Certificate-based sequential aggregate signature | |
Wei et al. | Group signature where group manager, members and open authority are identity-based | |
Tian et al. | A systematic method to design strong designated verifier signature without random oracles | |
Du et al. | Certificate-based key-insulated signature | |
Xiong et al. | A provably secure proxy signature scheme in certificateless cryptography | |
Zhang et al. | Certificateless signature and blind signature | |
Gao et al. | One-round ID-based blind signature scheme without ROS assumption | |
Hung et al. | A short certificate-based signature scheme with provable security | |
Wang et al. | Two constructions of fuzzy identity based signature | |
Chen et al. | New efficient certificateless blind signature scheme |