Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme
暂无分享,去创建一个
[1] Yi Mu,et al. Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications , 2017, Wirel. Pers. Commun..
[2] Liehuang Zhu,et al. A round-optimal lattice-based blind signature scheme for cloud services , 2017, Future Gener. Comput. Syst..
[3] Zhiwei Wang,et al. ID-based proxy re-signature without pairing , 2018, Telecommun. Syst..
[4] Caifen Wang,et al. Divisible On-Line/Off-Line Proxy Re-Signature , 2015 .
[5] Yan Li,et al. On-Line/Off-Line Threshold Proxy Re-Signature Scheme through the Simulation Approach , 2015 .
[6] Susan Hohenberger,et al. Proxy re-signatures: new definitions, algorithms, and applications , 2005, CCS '05.
[7] Xiaodong Yang,et al. Improved bidirectional blind proxy re-signature scheme: Improved bidirectional blind proxy re-signature scheme , 2013 .
[8] Xiao-Ming Hu,et al. Secure Identity-Based Blind Signature Scheme in the Standard Model , 2010, J. Inf. Sci. Eng..
[9] Siyuan Chen,et al. A Provably Secure Blind Signature Based on Coding Theory , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).
[10] Jianguo Pan,et al. Universally composable secure proxy re-signature scheme with effective calculation , 2017, Cluster Computing.
[11] Tulasi Menon. An Identity Based Proxy Re-Signature Scheme , 2012 .
[12] Chunlin Chen,et al. Revocable identity-based proxy re-signature against signing key exposure , 2018, PloS one.
[13] Kefei Chen,et al. Restrictive partially blind signature for resource-constrained information systems , 2009, Knowledge and Information Systems.
[14] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[15] Liang Yi-xin. Provably secure certificate less blind proxy re-signatures , 2012 .
[16] Yang Xiaodong. Improved bidirectional blind proxy re-signature scheme , 2013 .
[17] Prem Chandra Saxena,et al. A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme , 2017, ICISS.
[18] Yehuda Lindell,et al. Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions , 2007, TCC.
[19] Liu Yan. Analysis and Improvement of a Blind Proxy Re-signature Scheme Based on Standard Model , 2011 .
[20] Miaomiao Tian,et al. Identity-based proxy re-signatures from lattices , 2015, Inf. Process. Lett..
[21] Hong Xuan,et al. Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security , 2016 .
[22] Olivier Blazy,et al. A code-based blind signature , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[23] Xiaoming Hu,et al. Analysis and improvement of certificateless signature and proxy re-signature schemes , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[24] Fangguo Zhang,et al. A lattice-based partially blind signature , 2016, Secur. Commun. Networks.