Identity-based threshold ring signcryption from pairing
暂无分享,去创建一个
[1] Li Fa. An Efficient Identity-Based Signcryption Scheme , 2006 .
[2] Qiaoyan Wen,et al. An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..
[3] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[4] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[5] Tsz Hon Yuen,et al. Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.
[6] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[7] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[8] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[9] Chih-Hung Wang,et al. A new ring signature scheme with signer-admission property , 2007, Inf. Sci..
[10] Yi Mu,et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[11] Yuqing Zhang,et al. An efficient and provable secure identity-based ring signcryption scheme , 2009, Comput. Stand. Interfaces.
[12] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[15] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.
[16] C. Pandu Rangan,et al. On the Security of Identity Based Ring Signcryption Schemes , 2009, ISC.
[17] Lijun Zhun,et al. Efficient ID–Based Ring Signature and Ring Signcryption Schemes , 2008, 2008 International Conference on Computational Intelligence and Security.
[18] Hovav Shacham,et al. Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.
[19] C. Pandu Rangan,et al. Identity Based Online/Offline Signcryption Scheme , 2010, IACR Cryptol. ePrint Arch..
[20] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[21] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[22] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.