Efficient and short certificateless signatures secure against realistic adversaries
暂无分享,去创建一个
Xinyi Huang | Raylin Tso | Xun Yi | X. Yi | Xinyi Huang | R. Tso
[1] Yi Mu,et al. A New Short Signature Scheme Without Random Oracles from Bilinear Pairings , 2005, IACR Cryptol. ePrint Arch..
[2] Paulo S. L. M. Barreto,et al. On the Selection of Pairing-Friendly Groups , 2003, Selected Areas in Cryptography.
[3] Jiang Wu,et al. An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption , 2007, IACR Cryptol. ePrint Arch..
[4] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[5] Toshiaki Tanaka,et al. On the Existence of 3-Round Zero-Knowledge Protocols , 1998, CRYPTO.
[6] Bok-Min Goi,et al. An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[7] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[8] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[9] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[10] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[11] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[12] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[13] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[14] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[16] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[17] Raylin Tso,et al. Efficient Short Signatures from Pairing , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[18] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[19] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[20] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[21] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[22] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[23] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[24] Reihaneh Safavi-Naini,et al. New traitor tracing schemes using bilinear map , 2003, DRM '03.
[25] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[26] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[27] Sherman S. M. Chow,et al. Security Mediated Certificateless Signatures , 2007, ACNS.
[28] Xiaotie Deng,et al. Certificateless signature: a new security model and an improved generic construction , 2007, Des. Codes Cryptogr..
[29] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[30] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[31] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[32] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[33] Lei Zhang,et al. New Efficient Certificateless Signature Scheme , 2007, EUC Workshops.
[34] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[35] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[36] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.