Efficient Unrestricted Identity-Based Aggregate Signature Scheme
暂无分享,去创建一个
Yumin Yuan | Qian Zhan | Hua Huang | Yumin Yuan | Qiang Zhan | Hua Huang | Q. Zhan
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[3] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[4] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[5] Jung Hee Cheon,et al. A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..
[6] Dengguo Feng,et al. ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.
[7] Javier Herranz,et al. Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..
[8] Craig Gentry,et al. Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.
[9] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[10] Chanathip Namprempre,et al. Unrestricted Aggregate Signatures , 2007, ICALP.
[11] Zuhua Shao,et al. Fair exchange protocol of signatures based on aggregate signatures , 2008, Comput. Commun..
[12] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[13] Stanislaw Jarecki,et al. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.
[14] Kyung-Ah Shim. An ID-based aggregate signature scheme with constant pairing computations , 2010, J. Syst. Softw..
[15] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[16] Baoyuan Kang. On the Security of Some Aggregate Signature Schemes , 2012, J. Appl. Math..
[17] C. P. Rangan,et al. E � cient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation , 2012 .
[18] Jayaprakash Kar. Provably Secure Identity-Based Aggregate Signature Scheme , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[19] Chun-Hua Chen,et al. IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA , 2012 .
[20] Brent Waters,et al. Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.
[21] Jianhua Chen,et al. An efficient certificateless proxy signature scheme without pairing , 2013, Math. Comput. Model..
[22] Zhi Guan,et al. An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..
[23] Jia-Lun Tsai,et al. New Identity-Based Sequential Aggregate Signature Scheme from RSA , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[24] Yi Liu,et al. A non-delegatable strong designated verifier signature in ID-based setting for mobile environment , 2013, Math. Comput. Model..
[25] Caifen Wang,et al. Lossy data aggregation integrity scheme in wireless sensor networks , 2013, Comput. Electr. Eng..
[26] Tsz Hon Yuen,et al. Improvements on an authentication scheme for vehicular sensor networks , 2014, Expert Syst. Appl..
[27] Debiao He,et al. Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations , 2014, TheScientificWorldJournal.
[28] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..