Short and Adjustable Signatures
暂无分享,去创建一个
[1] Neal Koblitz,et al. An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm , 1998, CRYPTO.
[2] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[3] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[4] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[5] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[6] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[7] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Brent Waters,et al. Fully Secure and Fast Signing from Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[10] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[11] Neal Koblitz,et al. Good and Bad Uses of Elliptic Curves in Cryptography , 2002 .
[12] Silvio Micali,et al. Improving the exact security of digital signature schemes , 2001, Journal of Cryptology.
[13] Aggelos Kiayias,et al. Resource-based corruptions and the combinatorics of hidden diversity , 2013, ITCS '13.
[14] Jean-Sébastien Coron,et al. New Multilinear Maps Over the Integers , 2015, CRYPTO.
[15] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] 電子情報通信学会. IEICE transactions on fundamentals of electronics, communications and computer sciences , 1992 .
[18] Brent Waters,et al. Short and Stateless Signatures from the RSA Assumption , 2009, CRYPTO.
[19] Matthew Green,et al. Practical Short Signature Batch Verification , 2009, CT-RSA.
[20] Silvio Micali,et al. How to Construct Random Functions (Extended Abstract) , 1984, FOCS.
[21] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[22] Jan Camenisch,et al. Batch Verification of Short Signatures , 2007, Journal of Cryptology.
[23] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[24] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[25] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[26] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[27] Mihir Bellare,et al. Multi-instance Security and Its Application to Password-Based Cryptography , 2012, CRYPTO.
[28] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..