Efficient revocable certificateless public key encryption with a delegated revocation authority

TT Tsai, YM Tseng, SS Huang - Security and Communication …, 2015 - Wiley Online Library
Quite recently, Shen et al. proposed a revocable certificateless public key encryption (RCL‐
PKE) scheme in the standard model, in which the key generation center (KGC) can …

A provable secure pairing-free certificateless identification scheme

JJ Chin, SY Tan, SH Heng, RCW Phan… - International Journal of …, 2015 - Taylor & Francis
Certificateless identification (CLI) schemes offer an alternative solution to the certificate
management problem of traditional identification schemes, as well as remove the key …

Efficient and Provable Secure Pairing‐Free Security‐Mediated Identity‐Based Identification Schemes

JJ Chin, SY Tan, SH Heng… - The Scientific World …, 2014 - Wiley Online Library
Security‐mediated cryptography was first introduced by Boneh et al. in 2001. The main
motivation behind security‐mediated cryptography was the capability to allow instant …

An efficient and provable secure certificateless identification scheme in the standard model

JJ Chin, SH Heng, RCW Phan - KSII Transactions on Internet and …, 2014 - koreascience.kr
Abstract In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless
cryptography, a technique to remove key escrow from traditional identity-based cryptography …

[引用][C] Efficient certificateless encryption schemes from lattices

陈虎, 胡予濮, 连至助, 贾惠文 - Journal of Software, 2015

[引用][C] 有效的格上无证书加密方案

陈虎, 胡予濮, 连至助, 贾惠文 - 软件学报, 2015