Strong Forward Security in Identity-Based Signcryption
暂无分享,去创建一个
[1] Nigel P. Smart,et al. The Discrete Logarithm Problem on Elliptic Curves of Trace One , 1999, Journal of Cryptology.
[2] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[3] María Isabel González Vasco,et al. Combined (identity-based) public key schemes , 2008, IACR Cryptol. ePrint Arch..
[4] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[5] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[6] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[7] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[8] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[9] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[10] Madeline González Muñiz,et al. Security of signature schemes in the presence of key-dependent messages , 2010 .
[11] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[12] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[13] Ren-Junn Hwang,et al. An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Jean-Jacques Quisquater,et al. The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..
[16] Guomin Yang,et al. An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices , 2005, WINE.
[17] Zhang Ya-juan,et al. An identity-based key-exchange protocol , 2008, Wuhan University Journal of Natural Sciences.
[18] Yin Xin-Chun,et al. A New Forward-Secure Signcryption Scheme , 2006, 2006 International Conference on Communications, Circuits and Systems.
[19] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[20] Mohsen Toorani,et al. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve , 2008, 2008 International Conference on Computer and Electrical Engineering.
[21] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[22] Amit Sahai,et al. Efficient Non-interactive Proof Systems for Bilinear Groups , 2008, EUROCRYPT.
[23] Marc Girault,et al. An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange , 1990, ESORICS.
[24] Je Hong Park,et al. A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..
[25] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[26] Paulo S. L. M. Barreto,et al. Efficient and Forward-Secure Identity-Based Signcryption , 2004, IACR Cryptol. ePrint Arch..