Certificateless Homomorphic Signature Scheme for Network Coding
暂无分享,去创建一个
Jinyong Chang | Rui Xue | Maozhi Xu | Yanyan Ji | Bilin Shao | Rui Xue | Maozhi Xu | Yanyan Ji | Bilin Shao | Jinyong Chang
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[3] Nuttapong Attrapadung,et al. Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.
[4] Jinyong Chang,et al. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..
[5] Ying Zhu,et al. Multicast with network coding in application-layer overlay networks , 2004, IEEE Journal on Selected Areas in Communications.
[6] Hui Ma,et al. RKA Security of Identity-Based Homomorphic Signature Scheme , 2019, IEEE Access.
[7] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[8] Fei Wang,et al. RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.
[9] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[10] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[11] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[12] SK Hafizul Islam,et al. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.
[13] Jayaprakash Kar,et al. ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve , 2013, Int. J. Netw. Secur..
[14] Yang Ming,et al. Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage , 2019, IEEE Access.
[15] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[16] Wenbin Chen,et al. Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..
[17] Jian Shen,et al. A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Genqing Bian,et al. Comment on “A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding” , 2020, IEEE Transactions on Parallel and Distributed Systems.
[20] Sun,et al. Secure Certificateless Encryption with Short Ciphertext , 2010 .
[21] Dawu Gu,et al. Provably secure authenticated key exchange protocol under the CDH assumption , 2010, J. Syst. Softw..
[22] Dario Catalano,et al. Homomorphic Signatures and Message Authentication Codes , 2014, SCN.
[23] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[24] Christos Gkantsidis,et al. Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] Yupu Hu,et al. Lattice-based linearly homomorphic signature scheme over binary field , 2012, Science China Information Sciences.
[26] Yutaka Kawai,et al. Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[27] Wen-Guey Tzeng,et al. Unique Signature with Short Output from CDH Assumption , 2015, ProvSec.
[28] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[29] Flavio D. Garcia,et al. A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.
[30] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[31] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[32] Jinyong Chang,et al. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system , 2016, Secur. Commun. Networks.
[33] Chau Yuen,et al. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.
[34] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[35] Dan Boneh,et al. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.
[36] Jan M. Rabaey,et al. Overcoming untuned radios in wireless networks with network coding , 2006, IEEE Transactions on Information Theory.
[37] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[38] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..