Analysis and improvement of certificateless signature and proxy re-signature schemes
暂无分享,去创建一个
Xiaoming Hu | Xiaojun Zhang | Jian Wang | Huajie Xu | Yan Liu | Huajie Xu | Xiaoming Hu | Jian Wang | Xiaojun Zhang | Yan Liu
[1] Saudi Arabia,et al. Cryptanalysis of a certificateless aggregate signature scheme for mobile computation , 2013 .
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[4] Yong Yu,et al. On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Xie Qi. Certificateless signature scheme without bilinear pairings , 2012 .
[6] Wen Qiao-Yan,et al. Efficient and Provably-Secure Certificateless Aggregate Signature Scheme , 2013 .
[7] Zhi Guan,et al. An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] Dowon Hong,et al. Identity-based proxy signature from lattices , 2013, Journal of Communications and Networks.
[10] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[11] Weijia Jia,et al. Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..