Proxy Signature Scheme Based on Isomorphisms of Polynomials
暂无分享,去创建一个
[1] Jean-Charles Faugère,et al. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects , 2006, EUROCRYPT.
[2] Jean-Charles Faugère,et al. Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem , 2009, IACR Cryptol. ePrint Arch..
[3] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[4] Georg Fuchsbauer,et al. Anonymous Proxy Signatures , 2008, SCN.
[5] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[6] Taizo Shirai,et al. On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack , 2011, PQCrypto.
[7] Willi Meier,et al. An attack on the isomorphisms of polynomials problem with one secret , 2003, International Journal of Information Security.
[8] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[9] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[10] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[11] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[12] Louis Goubin,et al. Improved Algorithms for Isomorphisms of Polynomials , 1998, EUROCRYPT.
[13] Jacques Stern,et al. An Efficient Provable Distinguisher for HFE , 2006, ICALP.
[14] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[15] Ludovic Perret,et al. Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems , 2003, INDOCRYPT.
[16] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[17] Stanislav Bulygin,et al. Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks , 2010, INDOCRYPT.
[18] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[19] Amit K. Awasthi,et al. Proxy Blind Signature Scheme , 2003, IACR Cryptol. ePrint Arch..
[20] Ludovic Perret,et al. A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem , 2005, EUROCRYPT.