Tu et al., 2014 - Google Patents
Reattack of a certificateless aggregate signature scheme with constant pairing computationsTu et al., 2014
View PDF- Document ID
- 17774421471425119014
- Author
- Tu H
- He D
- Huang B
- Publication year
- Publication venue
- The Scientific World Journal
External Links
Snippet
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. Then a new certificateless aggregate signature scheme with …
- 238000004458 analytical method 0 abstract description 10
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tu et al. | Reattack of a certificateless aggregate signature scheme with constant pairing computations | |
| Xiong et al. | An efficient certificateless aggregate signature with constant pairing computations | |
| Wang et al. | Identity‐based remote data possession checking in public clouds | |
| Zhang et al. | Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts | |
| Zhang et al. | Anonymous attribute‐based proxy re‐encryption for access control in cloud computing | |
| Zhou et al. | Certificateless key‐insulated generalized signcryption scheme without bilinear pairings | |
| Gong et al. | Further improvement of a certificateless signature scheme without pairing | |
| Tian et al. | Cryptanalysis of a certificateless signature scheme without pairings | |
| Tsai et al. | Provably secure revocable id‐based signature in the standard model | |
| Zhang et al. | An efficient certificateless generalized signcryption scheme | |
| Li et al. | Privacy‐preserving multi‐receiver signcryption scheme for heterogeneous systems | |
| Deng et al. | A new certificateless signature with enhanced security and aggregation version | |
| Li et al. | Certificateless online/offline signcryption scheme | |
| Niu et al. | Privacy-preserving multi-party aggregate signcryption for heterogeneous systems | |
| Tian et al. | Certificateless and certificate‐based signatures from lattices | |
| Zhang et al. | An improved anonymous multi‐receiver identity‐based encryption scheme | |
| Yang et al. | Certificateless proxy re-encryption without pairings | |
| Luo et al. | A security communication model based on certificateless online/offline signcryption for Internet of Things | |
| Guo et al. | Attribute‐based ring signcryption scheme | |
| Hung et al. | Revocable ID‐Based Signature with Short Size over Lattices | |
| Qin et al. | Simultaneous authentication and secrecy in identity-based data upload to cloud | |
| Zhang et al. | Attack on Chen et al.'s certificateless aggregate signature scheme | |
| Deng et al. | Certificateless short signature scheme from pairing in the standard model | |
| Gan et al. | Revocable Key‐Aggregate Cryptosystem for Data Sharing in Cloud | |
| Shen et al. | Cryptanalysis of a certificateless aggregate signature scheme with efficient verification |