Sciweavers

133 search results - page 13 / 27
» Security Proof of Sakai-Kasahara's Identity-Based Encryption...
Sort
View
104
Voted
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 4 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 4 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
95
Voted
IJISEC
2008
69views more  IJISEC 2008»
15 years 16 days ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
124
Voted
ISCI
2008
160views more  ISCI 2008»
15 years 15 days ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
89
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 14 days ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow