Constructing Secure Warrant-Based Proxy Signcryption Schemes
暂无分享,去创建一个
[1] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[2] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[3] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .
[4] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[5] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[6] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[7] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[8] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[9] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[10] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[11] Tzong-Chen Wu,et al. Cryptanalysis and improvement of Petersen-Michels signcryption scheme , 1999 .
[12] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[13] H. Petersen,et al. Cryptanalysis and improvement of signcryption schemes , 1998 .
[14] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[15] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[16] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .