A lattice-based designated verifier signature for cloud computing
暂无分享,去创建一个
Qiang Liu | Chengpei Tang | Haibo Tian | Yongqiang Zhang | Haibo Tian | Chengpei Tang | Qiang Liu | Yongqiang Zhang
[1] Jindong Li,et al. A new certificate-based digital signature scheme in bilinear group , 2014, Int. J. Embed. Syst..
[2] Farookh Khadeer Hussain,et al. A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..
[3] Léo Ducas,et al. Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..
[4] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[5] Jin Li,et al. A short non-delegatable strong designated verifier signature , 2013, Frontiers of Computer Science.
[6] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[7] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[8] Yi Mu,et al. Short (Identity-Based) Strong Designated Verifier Signature Schemes , 2006, ISPEC.
[9] Bo Sun,et al. Ring Signature Schemes from Lattice Basis Delegation , 2011, ICICS.
[10] Jin Wang. Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation , 2010, IACR Cryptol. ePrint Arch..
[11] Pierre-Louis Cayrel,et al. A Lattice-Based Threshold Ring Signature Scheme , 2010, LATINCRYPT.
[12] Xinhua Peng,et al. Erratum: Quantum Factorization of 143 on a Dipolar-Coupling Nuclear Magnetic Resonance System [Phys. Rev. Lett. 108, 130501 (2012)] , 2012 .
[13] I. Chuang,et al. Quantum Digital Signatures , 2001, quant-ph/0105032.
[14] Yupu Hu,et al. LATTICE-BASED STRONG DESIGNATE VERIFIER SIGNATURE AND ITS APPLICATIONS , 2012 .
[15] Wei Ren,et al. A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function , 2014, Int. J. Comput. Sci. Eng..
[16] Xavier Boyen,et al. Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting , 2013, AFRICACRYPT.
[17] Vadim Lyubashevsky,et al. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures , 2009, ASIACRYPT.
[18] Yael Tauman Kalai,et al. A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model , 2010, IACR Cryptol. ePrint Arch..
[19] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[20] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[21] L M Vandersypen,et al. Experimental realization of an order-finding algorithm with an NMR quantum computer. , 2000, Physical review letters.
[22] Keisuke Tanaka,et al. Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems , 2008, ASIACRYPT.
[23] Julien Schrek,et al. Improved Lattice-Based Threshold Ring Signature Scheme , 2013, PQCrypto.
[24] Haibo Tian,et al. Toward quantum-resistant strong designated verifier signature , 2014, Int. J. Grid Util. Comput..
[25] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[26] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[27] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[28] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[29] Yi Mu,et al. Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.