Identity-based key-insulated aggregate signature scheme
暂无分享,去创建一个
[1] Nicolás González-Deleito,et al. A New Key-Insulated Signature Scheme , 2004, ICICS.
[2] Yuh-Min Tseng,et al. ID-based key-insulated signature scheme with batch verifications and its novel application , 2012 .
[3] Jian Weng,et al. Identity-Based Key-Insulated Signature Without Random Oracles , 2006, 2006 International Conference on Computational Intelligence and Security.
[4] Dengguo Feng,et al. ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.
[5] Zhongmei Wan. A New Identity-Based Parallel Key-Insulated Signature Scheme without Random Oracles , 2011, 2011 Fourth International Symposium on Computational Intelligence and Design.
[6] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[7] P. V. S. S. N. Gopal,et al. New identity based signature scheme using bilinear pairings over elliptic curves , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[8] Jin Li,et al. A Strong Identity Based Key-Insulated Cryptosystem , 2006, EUC Workshops.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Hui-yan Chen,et al. Practical identity-based aggregate signature from bilinear maps , 2008 .
[11] Jian Weng,et al. Identity-Based Key-Insulated Signature with Secure Key-Updates , 2006, Inscrypt.
[12] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[13] Kefei Chen,et al. An efficient threshold key-insulated signature scheme , 2011 .
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Yuan Zhou,et al. Identity Based Key Insulated Signature , 2006, ISPEC.
[16] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[17] Jia Yu,et al. Key-insulated aggregate signature , 2014, Frontiers of Computer Science.
[18] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[19] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[20] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[21] Ming Xiao,et al. Dimethyl Sulfoxide Damages Mitochondrial Integrity and Membrane Potential in Cultured Astrocytes , 2014, PloS one.
[22] Craig Gentry,et al. Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.
[23] Bok-Min Goi,et al. Java Implementation for Pairing-Based Cryptosystems , 2010, ICCSA.
[24] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[25] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[26] Kefei Chen,et al. Attribute-based key-insulated signature and its applications , 2014, Inf. Sci..
[27] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[28] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[29] Xuefeng Zheng,et al. An Identity Based Aggregate Signature from Pairings , 2011, J. Networks.
[30] Yumin Yuan,et al. Efficient Unrestricted Identity-Based Aggregate Signature Scheme , 2014, PloS one.