A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment
暂无分享,去创建一个
[1] Tsuyoshi Takagi,et al. Revocable and strongly unforgeable identity-based signature scheme in the standard model , 2016, Secur. Commun. Networks.
[2] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[3] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[4] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[7] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[8] Marko Hölbl,et al. Two proposed identity-based three-party authenticated key agreement protocols from pairings , 2010, Comput. Secur..
[9] Chen Yuan,et al. On the security of two identity-based signature schemes based on pairings , 2016, Inf. Process. Lett..
[10] Xun Yi,et al. An identity-based signature scheme from the Weil pairing , 2003, IEEE Communications Letters.
[11] Sherali Zeadally,et al. Efficient Revocable ID-Based Signature With Cloud Revocation Server , 2017, IEEE Access.
[12] Wei Shi-min. An Improved Elliptic Curve Digital Signature Algorithm , 2013 .
[13] Yuh-Min Tseng,et al. Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.
[14] Wenfen Liu,et al. Forward-secure identity-based signature with efficient revocation , 2017, Int. J. Comput. Math..
[15] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[16] Joonsang Baek,et al. A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification , 2017, IEEE Transactions on Services Computing.
[17] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[18] Ying-Hao Hung,et al. Strongly Secure Revocable ID-based Signature without Random Oracles , 2014, Inf. Technol. Control..
[19] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[20] Kim-Kwang Raymond Choo,et al. An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment , 2018, Ad Hoc Networks.
[21] Jianfeng Ma,et al. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.