Certificateless Signature Scheme without Random Oracles
暂无分享,去创建一个
Da Li | Liwen Tian | Yumin Yuan | Haishan Zhu | Yumin Yuan | Haishan Zhu | Liwen Tian | Da-Xing Li
[1] Qiong Huang,et al. Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.
[2] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[3] Antonio Laganà,et al. Computational Science and Its Applications – ICCSA 2004 , 2004, Lecture Notes in Computer Science.
[4] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[5] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[6] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[7] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[8] Mihir Bellare,et al. An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem , 2004, EUROCRYPT.
[9] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[10] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[11] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[12] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[13] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[14] Bok-Min Goi,et al. An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[15] Yi Mu,et al. Emerging Directions in Embedded and Ubiquitous Computing , 2006 .
[16] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[17] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[18] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[19] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[20] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[21] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[22] Xiangxue Li,et al. Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .
[23] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.