References
- S.S. Al-Riyami and K.G. Paterson, Certificateless public key cryptography, in ASIACRYPT, Taipei, Taiwan, Lecture Notes in Computer Science, Vol. 2894, C.-S. Laih, ed., Springer, Berlin, Heidelberg, 2003, pp. 452–473.
- M. Bellare and A. Palacio, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 2442, M. Yung, ed., Springer, Berlin, Heidelberg, 2002, pp. 162–177.
- M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, The one-more-rsa-inversion problems and the security of Chaum's blind signature scheme, J. Cryptol. 16 (2003), pp. 185–215. doi: 10.1007/s00145-002-0120-1
- M. Bellare, C. Namprempre and G. Neven, Security proofs for identity-based identification and signature schemes, in EUROCRYPT, Interlaken, Switzerland, Lecture Notes in Computer Science, Vol. 3027, C. Cachin and J. Camenisch, eds., Springer, Berlin, Heidelberg, 2004, pp. 268–286.
- J.J. Chin, R.C.W. Phan, R. Behnia and S.H. Heng, An efficient and provably secure certificateless identification scheme, in SECRYPT, Rejkavik, Iceland, P. Samarati, ed., SciTePress, Lisbon, 2013, pp. 371–378.
- J.J. Chin, R. Behnia, S.H. Heng and R.C.W. Phan, Cryptanalysis of a certificateless identification scheme, Secur. Commun. Networks (2014). Available at http://dx.doi.org/10.1002/sec.963.
- I. Damgård, Towards practical public key systems secure against chosen ciphertext attacks, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 576, J. Feigenbaum, ed., Springer, Berlin, Heidelberg, 1991, pp. 445–456.
- M.H. Dehkordi and R. Alimoradi, Certificateless identification protocols from super singular elliptic curve, Secur. Commun. Networks 7(6) (2014), pp. 979–986.
- A.W. Dent, A survey of certificateless encryption schemes and security models, Int. J. Inf. Secur. 7 (2008), pp. 349–377. doi: 10.1007/s10207-008-0055-0
- D. He, S. Padhye, and J. Chen, An efficient certificateless two-party authenticated key agreement protocol, Comput. Math. Appl. 64 (2012), pp. 1914–1926. doi: 10.1016/j.camwa.2012.03.044
- D. He, Y. Chen and J. Chen, An efficient certificateless proxy signature scheme without pairing, Math. Comput. Model. 57 (2013), pp. 2510–2518. doi: 10.1016/j.mcm.2012.12.037
- X. Huang, Y. Mu, W. Susilo, D.S. Wong and W. Wu, Certificateless signature revisited, in ACISP, Townsville, Australia, Lecture Notes in Computer Science, Vol. 4586, J. Pieprzyk, H. Ghodosi, and E. Dawson, eds., Springer, Berlin, Heidelberg, 2007, pp. 308–322.
- K. Kurosawa and S.H. Heng, From digital signature to ID-based identification/signature, in Public Key Cryptography, Singapore, Lecture Notes in Computer Science, Vol. 2947, F. Bao, R.H. Deng, and J. Zhou, eds., Springer, Berlin, Heidelberg, 2004, pp. 248–261.
- C.P. Schnorr, Efficient identification and signatures for smart cards, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 435, G. Brassard, ed., Springer, Berlin, Heidelberg, 1989, pp. 239–252.
- A. Shamir, Identity-based cryptosystems and signature schemes, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, eds., Springer, Berlin, Heidelberg, 1984, pp. 47–53.