Identity-Based Chameleon Hash Scheme without Key Exposure
暂无分享,去创建一个
Kwangjo Kim | Willy Susilo | Xiaofeng Chen | Fangguo Zhang | Haibo Tian | Jin Li | W. Susilo | Fangguo Zhang | Kwangjo Kim | Haibo Tian | Xiaofeng Chen | Jin Li
[1] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[2] Kaoru Kurosawa,et al. 3-Move Undeniable Signature Scheme , 2005, EUROCRYPT.
[3] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[4] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[5] Antoine Joux,et al. The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems , 2002, ANTS.
[6] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Kaoru Kurosawa,et al. The security of the FDH variant of Chaum's undeniable signature scheme , 2005, IEEE Transactions on Information Theory.
[9] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[10] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[11] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[12] Dongqing Xie,et al. Chameleon Hashes Without Key Exposure Based on Factoring , 2007, Journal of Computer Science and Technology.
[13] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[14] Serge Vaudenay,et al. Generic Homomorphic Undeniable Signatures , 2004, ASIACRYPT.
[15] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[16] Victor S. Miller,et al. The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.
[17] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[18] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[19] Fei Li,et al. Chameleon hash without key exposure based on Schnorr signature , 2009, Comput. Stand. Interfaces.
[20] Jan Camenisch,et al. Confirmer Signature Schemes Secure against Adaptive Adversaries , 2000, EUROCRYPT.
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[22] Reihaneh Safavi-Naini,et al. ID-Based Chameleon Hashes from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..
[23] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[24] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[25] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[26] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[27] Kaoru Kurosawa,et al. Relations Among Security Notions for Undeniable Signature Schemes , 2006, SCN.
[28] Steven D. Galbraith,et al. Invisibility and Anonymity of Undeniable and Confirmer Signatures , 2003, CT-RSA.
[29] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[30] Kenneth G. Paterson,et al. RSA-Based Undeniable Signatures for General Moduli , 2002, CT-RSA.
[31] Jean-Jacques Quisquater,et al. Identity Based Undeniable Signatures , 2004, CT-RSA.
[32] David Chaum,et al. Designated Confirmer Signatures , 1994, EUROCRYPT.
[33] Eli Biham,et al. Near-Collisions of SHA-0 , 2004, CRYPTO.
[34] Kwangjo Kim,et al. Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems , 2009, IACR Cryptol. ePrint Arch..
[35] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[36] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[37] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[38] Rosario Gennaro,et al. Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks , 2004, CRYPTO.