Cryptanalysis of an Identity Based Signcryption without Random Oracles
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[3] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[4] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[5] Yuliang Zheng,et al. Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.
[6] Pil Joong Lee,et al. New Signcryption Schemes Based on KCDSA , 2001, ICISC.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Kyung-Ah Shim,et al. New DSA-Verifiable Signcryption Schemes , 2002, ICISC.
[9] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.
[10] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[11] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[12] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.