An Authentication Scheme Using Identity-based Encryption & Blockchain
暂无分享,去创建一个
Hui Li | Li Xu | Beini Zhou | Hui Li | Beini Zhou | Li Xu
[1] Hui Li,et al. Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain , 2017, 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[2] Andrew Nash,et al. PKI: Implementing and Managing E-Security , 2001 .
[3] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[6] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[7] Byoungcheon Lee,et al. Secure Key Issuing in ID-based Cryptography , 2004, ACSW.
[8] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.