Security Analysis of a Proxy Signature Scheme over Braid Groups
暂无分享,去创建一个
[1] Jinxiang Dong,et al. A privacy-protecting proxy signature scheme and its application , 2004, ACM-SE 42.
[2] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[3] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[4] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[5] Hugh R. Morton,et al. ALGORITHMS FOR POSITIVE BRAIDS , 1994 .
[6] Sangjin Lee,et al. Pseudorandomness from Braid Groups , 2001, CRYPTO.
[7] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[8] Zhenfu Cao,et al. Proxy signature scheme using self-certified public keys , 2004, Appl. Math. Comput..
[9] Girraj Kumar Verma. A Proxy Signature Scheme over Braid Groups , 2008, IACR Cryptol. ePrint Arch..
[10] Mingsheng Wang,et al. On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.
[11] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[12] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[13] Joan S. Birman,et al. A new approach to the word and conjugacy problems in the braid groups , 1997 .
[14] Min-Shiang Hwang,et al. Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..
[15] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[16] Dennis Hofheinz,et al. A Practical Attack on Some Braid Group Based Cryptographic Primitives , 2003, Public Key Cryptography.
[17] F. A. Garside,et al. THE BRAID GROUP AND OTHER GROUPS , 1969 .
[18] Jang-Won Lee,et al. New Signature Scheme Using Conjugacy Problem , 2002, IACR Cryptol. ePrint Arch..
[19] Jung Hee Cheon,et al. An Efficient Implementation of Braid Groups , 2001, ASIACRYPT.
[20] E. Artin. The theory of braids. , 1950, American scientist.
[21] J. Birman. Braids, Links, and Mapping Class Groups. , 1975 .
[22] Robert H. Deng,et al. Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2004, IACR Cryptol. ePrint Arch..
[23] Hung-Min Sun,et al. On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..