Multi-key Hierarchical Identity-Based Signatures
暂无分享,去创建一个
[1] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[2] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[3] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[4] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[5] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[6] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[7] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Craig Gentry,et al. Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.
[10] Masayuki Abe,et al. Topics in Cryptology CT-RSA 2007 , 2007 .
[11] Ronald L. Rivest,et al. Lightweight Email Signatures (Extended Abstract) , 2006, SCN.
[12] Ronald L. Rivest,et al. Lightweight Signatures for Email , 2005 .
[13] Jason Crampton,et al. Role Signatures for Access Control in Grid Computing , 2007 .
[14] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[15] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[16] Refik Molva,et al. Policy-Based Cryptography and Applications , 2005, Financial Cryptography.
[17] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[18] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[19] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[20] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[21] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[22] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[23] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[24] Nigel P. Smart. Access Control Using Pairing Based Cryptography , 2003, CT-RSA.
[25] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[26] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[27] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[28] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[29] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[30] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[31] Javier Herranz,et al. On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.
[32] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[33] Joonsang Baek,et al. Identity-based threshold signature scheme from the bilinear pairings (extended abstract) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[34] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[35] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[36] Adam Duffy,et al. A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..
[37] Mihir Bellare,et al. Identity-Based Multi-signatures from RSA , 2007, CT-RSA.
[38] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[39] Rafail Ostrovsky,et al. Sequential Aggregate Signatures and Multisignatures Without Random Oracles , 2006, EUROCRYPT.
[40] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[41] K. Paterson,et al. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication ∗ , 2007 .
[42] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[43] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[44] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[45] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[46] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.
[47] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.