Author:
Shabisha Placide,Braeken An,Touhafi Abdellah,Steenhaut Kris
Publisher
Springer International Publishing
Reference42 articles.
1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, vol. 196, pp. 47–53 (1984)
2. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, pp. 452–473 (2003)
3. Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 272–293 (2003)
4. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Annual International Cryptology Conference, pp. 165–179 (1997)
5. Le, M.-H., Hwang, S.O.: Certificate-based signcryption scheme without pairing: directly verifying signcrypted messages using a public key. ETRI J. 38(4), 724–734 (2016)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献