Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
暂无分享,去创建一个
Zhenfu Cao | Takeshi Okamoto | Eiji Okamoto | Ying Miao | Lihua Wang | E. Okamoto | Z. Cao | Y. Miao | T. Okamoto | Lihua Wang
[1] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[4] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[5] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[8] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[9] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[10] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[11] Antoine Joux,et al. The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems , 2002, ANTS.
[12] Zhenfu Cao,et al. Transformation-free proxy cryptosystems and their applications to electronic commerce , 2004, InfoSecu '04.