Two Proxy Signcryption Schemes from Bilinear Pairings
暂无分享,去创建一个
Zhenfu Cao | Qin Wang | Z. Cao | Qin Wang
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Kyung-Ah Shim,et al. New DSA-Verifiable Signcryption Schemes , 2002, ICISC.
[3] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[4] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[5] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[6] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[7] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[8] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[9] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[10] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[11] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[12] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[13] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[14] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[15] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[16] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[17] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[18] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[19] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[20] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[21] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[22] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[23] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[24] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[25] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[26] Reihaneh Safavi-Naini,et al. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..
[27] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[28] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.