Self-Certified Proxy Convertible Authenticated Encryption Scheme
暂无分享,去创建一个
Han-Yu Lin | Yi-Shiung Yeh | Tzong-Sun Wu | Ting-Yu Huang | Y. Yeh | Han-Yu Lin | Tzong-Sun Wu | Ting-Yu Huang
[1] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[2] Jiqiang Lu,et al. Practical convertible authenticated encryption schemes using self-certified public keys , 2005, Appl. Math. Comput..
[3] Patrick Horster,et al. Authenticated encryption schemes with low communication costs , 1994 .
[5] Fangguo Zhang,et al. A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[6] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[7] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[8] Chien-Lung Hsu,et al. Convertible authenticated encryption scheme , 2002, J. Syst. Softw..
[9] Chin-Chen Chang,et al. An Efficient Convertible Authenticated Encryption Scheme and Its Variant , 2003, ICICS.
[10] S. Araki,et al. The Limited Verifier Signature and Its Application , 1999 .
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[15] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.