Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks
暂无分享,去创建一个
Lei Zhang | Lifei Wei | Dongmei Huang | Kai Zhang | Lifei Wei | Dongmei Huang | Kaibo Zhang | Lei Zhang
[1] Xiaolei Dong,et al. Identity based signature scheme based on cubic residues , 2011, Science China Information Sciences.
[2] Robert H. Deng,et al. Efficient discrete logarithm based multi-signature scheme in the plain public key model , 2010, Des. Codes Cryptogr..
[3] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[4] Matthew Green,et al. Synchronized aggregate signatures: new definitions, constructions and applications , 2010, CCS '10.
[5] Yixian Yang,et al. Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues , 2012, Int. J. Netw. Secur..
[6] Krste Asanovic,et al. Energy Aware Lossless Data Compression , 2003, MobiSys.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Lian Guangxin. Efficient Identity-Based Threshold Ring Signature Based on Cubic Residues , 2013 .
[9] Craig Gentry,et al. Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.
[10] Feng Wang,et al. Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..
[11] Weidong Qiu,et al. Identity Based Signature Scheme Based on Quadratic Residues , 2007 .
[12] Antonio Liotta,et al. Ensembles of incremental learners to detect anomalies in ad hoc sensor networks , 2015, Ad Hoc Networks.
[13] Adrian Perrig,et al. Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] K. Itakura,et al. A public-key cryptosystem suitable for digital multisignatures , 1983 .
[16] Lifei Wei,et al. Modeling and Analysis in Marine Big Data: Advances and Challenges , 2015 .
[17] Fuw-Yi Yang,et al. Improving an efficient ID-based RSA multisignature , 2013, J. Ambient Intell. Humaniz. Comput..
[18] Mihir Bellare,et al. Identity-Based Multi-signatures from RSA , 2007, CT-RSA.
[19] Rui Zhang,et al. An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..
[20] Jung Hee Cheon,et al. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma , 2008, CCS.
[21] Xiaolei Dong,et al. Identity-based signature scheme based on quadratic residues , 2007, Science in China Series F: Information Sciences.
[22] Stanislaw Jarecki,et al. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.
[23] Lei Zhang,et al. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing , 2016, Secur. Commun. Networks.
[24] Antonio Liotta,et al. Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.
[25] Javier Herranz,et al. Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$2k-th Power Residue Symbols , 2017, Journal of Cryptology.
[26] Xiaolei Dong,et al. Secure identity-based multisignature schemes under quadratic residue assumptions , 2013, Secur. Commun. Networks.