An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
暂无分享,去创建一个
Jian Shen | Hongyang Yan | Yi Tang | Zhengan Huang | Qun Lin | Wenbin Chen | Jian Shen | Zhengan Huang | Hongyang Yan | Wenbin Chen | Yi Tang | Qun Lin
[1] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[2] Siavash Khorsandi,et al. An identity-based digital signature scheme to detect pollution attacks in intra-session network coding , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[3] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[4] Dario Catalano,et al. Authenticating Computation on Groups: New Homomorphic Primitives and Applications , 2014, ASIACRYPT.
[5] Chandrashekhar Meshram,et al. An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..
[6] Pankaj Sarde,et al. A Secure ID-based Proxy Signature Scheme from Bilinear Pairings , 2015 .
[7] David Mandell Freeman,et al. Improved Security for Linearly Homomorphic Signatures: A Generic Framework , 2012, Public Key Cryptography.
[8] Morshed U. Chowdhury,et al. Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi) , 2016, ATIS.
[9] Mingwu Zhang,et al. An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding , 2017, EIDWT.
[10] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[11] Dario Catalano,et al. Homomorphic Signatures and Message Authentication Codes , 2014, SCN.
[12] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[13] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[14] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Nuttapong Attrapadung,et al. Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.
[16] Wei Xiong,et al. Inapproximability results for the minimum integral solution problem with preprocessing over ℓ∞ℓ∞ norm , 2013, Theor. Comput. Sci..
[17] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] M. Shruthi,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2016 .
[20] Thomas Peters,et al. Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures , 2013, Public Key Cryptography.
[21] Sen-Shan Huang,et al. Leakage-resilient ID-based signature scheme in the generic bilinear group model , 2016, Secur. Commun. Networks.
[22] Thomas Peters,et al. Computing on Authenticated Data: New Privacy Definitions and Constructions , 2012, ASIACRYPT.
[23] Daniel Wichs,et al. Leveled Fully Homomorphic Signatures from Standard Lattices , 2015, IACR Cryptol. ePrint Arch..
[24] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[25] Elaine Shi,et al. Adaptively Secure Fully Homomorphic Signatures Based on Lattices , 2014, IACR Cryptol. ePrint Arch..
[26] Bao Li,et al. Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures , 2015, ISC.
[27] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[28] Tatsuaki Okamoto,et al. Homomorphic Signatures for Polynomial Functions with Shorter Signatures , 2013 .
[29] Francesco Rossi,et al. Implementing identity-based key agreement in embedded devices , 2015, 2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS).
[30] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[31] Bogdan Warinschi,et al. Homomorphic Signatures with Efficient Verification for Polynomial Functions , 2014, CRYPTO.
[32] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[33] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[34] Wenbin Chen,et al. Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..
[35] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[36] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[37] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[38] Dan Boneh,et al. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.
[39] Bogdan Warinschi,et al. Adaptive Pseudo-Free Groups and Applications , 2011, IACR Cryptol. ePrint Arch..