1997
DOI: 10.1007/978-0-387-35256-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Self-certified keys — Concepts and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
4

Year Published

2000
2000
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(44 citation statements)
references
References 10 publications
0
40
0
4
Order By: Relevance
“…The authors of NIKAP had the same idea of ours and proposed a non-interactive key establishment scheme using the notion of self-certified public key [12]. By using their noninteractive key establishment scheme, they made it possible for nodes to establish pair-wise keys in the course of routing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of NIKAP had the same idea of ours and proposed a non-interactive key establishment scheme using the notion of self-certified public key [12]. By using their noninteractive key establishment scheme, they made it possible for nodes to establish pair-wise keys in the course of routing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…A key management system that makes it difficult to link public keys in smartcards with users [Petersen and Horster, 1997], can be used to ensure a higher level of privacy.…”
Section: Ensuring Privacymentioning
confidence: 99%
“…In [4], Baek et al proposed a CL-encryption scheme without pairing, which was related to the early works on the self-certified keys [10,11]. However, their scheme can't be converted to SGC-PKE directly and only reaches Girault's trusted level 2.…”
Section: Introductionmentioning
confidence: 99%