Identity Based Generalized Signcryption Scheme in the Standard Model
暂无分享,去创建一个
Yang Ming | Xiaoqin Shen | Jie Feng | Xiaoqin Shen | Yang Ming | Jie Feng
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] John Linn,et al. Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures , 1987, RFC.
[3] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[4] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[5] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[6] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[9] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[10] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[11] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[12] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[13] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[14] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[15] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[16] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[17] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[18] Xiaoyuan Yang,et al. ECGSC: Elliptic Curve based Generalized Signcryption Scheme , 2006, IACR Cryptol. ePrint Arch..
[19] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[20] Xu An Wang,et al. Provable Secure Generalized Signcryption , 2007, IACR Cryptol. ePrint Arch..
[21] Sunder Lal,et al. ID based generalized signcryption , 2008, IACR Cryptol. ePrint Arch..
[22] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[23] C. Pandu Rangan,et al. Identity Based Public Verifiable Signcryption Scheme , 2010, ProvSec.
[24] Gang Yu,et al. Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..
[25] Qiaoyan Wen,et al. An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..
[26] Sunder Lal,et al. An efficient identity based generalized signcryption scheme , 2011, Theor. Comput. Sci..
[27] Fahad Bin Muhaya,et al. Efficient Identity-Based Signcryption in the Standard Model , 2011, ProvSec.