A Signcryption Scheme Based on Secret Sharing Technique
暂无分享,去创建一个
[1] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] David Pointcheval,et al. Parallel authentication and public-key encryption , 2003 .
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] JooSeok Song,et al. Information Security and Cryptology - ICISC’99 , 1999, Lecture Notes in Computer Science.
[7] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[8] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[9] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[10] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[11] Eiji Okamoto,et al. Verfiable Secret Sharing and Time Capsules , 1999, ICISC.
[12] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[13] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[14] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[17] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[18] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[19] Pankaj Rohatgi,et al. A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.