A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing. | 0 | 0.34 | 2021 |
Non-transferability in Proxy Re-Encryption Revisited. | 0 | 0.34 | 2020 |
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts. | 0 | 0.34 | 2020 |
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. | 0 | 0.34 | 2019 |
Sharing Of Encrypted Files In Blockchain Made Simpler | 0 | 0.34 | 2019 |
A Closer Look at Anonymous Proxy Re-Encryption Schemes. | 0 | 0.34 | 2019 |
Splitting and Aggregating Signatures in Cryptocurrency Protocols | 0 | 0.34 | 2019 |
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts. | 0 | 0.34 | 2019 |
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. | 0 | 0.34 | 2018 |
An Efficient Non-transferable Proxy Re-encryption Scheme. | 0 | 0.34 | 2017 |
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing. | 0 | 0.34 | 2017 |
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives. | 0 | 0.34 | 2016 |
Practical IBE Secure under CBDH - Encrypting Without Pairing. | 0 | 0.34 | 2015 |
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks. | 0 | 0.34 | 2015 |
A Revocable Online-Offline Certificateless Signature Scheme without Pairing. | 0 | 0.34 | 2013 |
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round | 0 | 0.34 | 2013 |
Efficient Certificateless Online/Offline Signature with tight security | 1 | 0.37 | 2013 |
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. | 2 | 0.38 | 2012 |
ID based signcryption scheme in standard model | 6 | 0.42 | 2012 |
Group key establishment (GKE): Two/three party key exchange to GKE | 0 | 0.34 | 2012 |
Efficient Certificateless Online/Offline Signature. | 0 | 0.34 | 2012 |
On the Security of Attribute Based Signature Schemes. | 0 | 0.34 | 2012 |
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. | 1 | 0.35 | 2012 |
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. | 0 | 0.34 | 2012 |
Compact Stateful Encryption Schemes with Ciphertext Verifiability. | 2 | 0.39 | 2012 |
Deterministic identity based signature scheme and its application for aggregate signatures | 3 | 0.39 | 2012 |
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. | 0 | 0.34 | 2012 |
CCA2 Secure Certificateless Encryption Schemes Based on RSA. | 0 | 0.34 | 2011 |
Identity-based deterministic signature scheme without forking-lemma | 8 | 0.48 | 2011 |
Compact CCA-Secure Encryption with Ciphertext Verifiability. | 0 | 0.34 | 2011 |
Identity based online/offline encryption and signcryption schemes revisited | 5 | 0.45 | 2011 |
On the Security of ID Based Signcryption Schemes. | 4 | 0.41 | 2011 |
Identity Based Self Delegated Signature - Self Proxy Signatures | 0 | 0.34 | 2010 |
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA. | 2 | 0.37 | 2010 |
Identity Based Online/Offline Signcryption Scheme. | 6 | 0.47 | 2010 |
Identity based partial aggregate signature scheme without pairing | 5 | 0.45 | 2010 |
An Identity based Ring Signcryption Scheme with Public Verifiability. | 0 | 0.34 | 2010 |
On the Security of Identity Based Threshold Unsigncryption Schemes | 2 | 0.37 | 2010 |
Security Weaknesses in Two Certificateless Signcryption Schemes. | 1 | 0.35 | 2010 |
Identity Based Online/Offline Encryption Scheme. | 0 | 0.34 | 2010 |
Identity based public verifiable signcryption scheme | 10 | 0.51 | 2010 |
Certificateless KEM and hybrid signcryption schemes revisited | 6 | 0.51 | 2010 |
Identity Based Aggregate Signcryption Schemes | 10 | 0.57 | 2009 |
Scalable Compilers for Group Key Establishment : Two/Three Party to Group. | 2 | 0.38 | 2009 |
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing | 6 | 0.46 | 2009 |
Breaking and Building of Group Inside Signature. | 0 | 0.34 | 2009 |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme | 3 | 0.40 | 2009 |
On the Security of Identity Based Ring Signcryption Schemes | 5 | 0.46 | 2009 |
A note on the Certificateless Multi-receiver Signcryption Scheme. | 3 | 0.40 | 2009 |
Security Analysis of Aggregate signature and Batch verification signature schemes | 7 | 0.50 | 2009 |