Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings
暂无分享,去创建一个
[1] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[2] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[3] G. P. Biswas,et al. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks , 2012, Ann. des Télécommunications.
[4] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[5] Joe Suzuki,et al. Elliptic Curve Discrete Logarithms and the Index Calculus , 1998, ASIACRYPT.
[6] Jerome A. Solinas. Generalized Mersenne Prime , 2005, Encyclopedia of Cryptography and Security.
[7] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[8] Xiao-Ping Zhang,et al. ID-Based Designed-verifier Multisignature without Trusted PKG , 2010, 2010 Third International Conference on Information and Computing.
[9] Lein Harn,et al. Efficient identity-based RSA multisignatures , 2008, Comput. Secur..
[10] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[11] Yang Guang,et al. An identity-based multisignature scheme from the Weil pairing , 2010, 2010 International Conference On Computer Design and Applications.
[12] Fuw-Yi Yang,et al. Improvement of an Efficient ID-Based RSA Multisignature , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[13] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[14] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[15] K. Itakura,et al. A public-key cryptosystem suitable for digital multisignatures , 1983 .
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Mu-Yen Chen,et al. Further Remarks on Identity-Based RSA Multi-signature , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Debasis Giri,et al. An Improved Efficient Multisignature Scheme in Group Communication Systems , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[19] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[20] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Bok-Min Goi,et al. Java Implementation for Pairing-Based Cryptosystems , 2010, ICCSA.
[23] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[24] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[25] Futai Zhang,et al. An Efficient Certificateless Short Designated Verifier Signature Scheme , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[26] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[27] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[28] L. Harn. New digital signature scheme based on discrete logarithm , 1994 .
[29] Sanjay Burman,et al. Cryptography and security - future challenges and issues , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[30] Neal Koblitz,et al. Hyperelliptic cryptosystems , 1989, Journal of Cryptology.
[31] Dong Hoon Lee,et al. A new provably secure certificateless short signature scheme , 2011, Comput. Math. Appl..
[32] Gerhard Frey,et al. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.
[33] Yi Mu,et al. Certificateless Designated Verifier Signature Schemes , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[34] Erl-Huei Lu,et al. Dynamic reblocking RSA-based multisignatures scheme for computer and communication networks , 2002, IEEE Communications Letters.
[35] Yu-Fang Chung,et al. Digital multi-signature scheme based on the Elliptic Curve cryptosystem , 2004, Journal of Computer Science and Technology.
[36] Ashutosh Saxena,et al. Identity Based Multisignatures , 2006, Informatica.
[37] K. Nyberg. New digital signature scheme based on discrete logarithm , 1994 .
[38] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[39] Sagar Patil,et al. A novel proxy signature scheme based on user hierarchical access control policy , 2013, J. King Saud Univ. Comput. Inf. Sci..
[40] Yinliang Zhao,et al. Two Efficient Digital Multisignature Schemes , 2008, 2008 International Symposium on Computational Intelligence and Design.
[41] Shenghe Sun,et al. An ID-based Multi-signature Scheme , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[42] Duc-Phong Le,et al. A New Multisignature Scheme based on Strong Diffie-Hellman Assumption , 2007 .
[43] Sk Hafizul Islam,et al. Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings , 2013, J. King Saud Univ. Comput. Inf. Sci..
[44] G. P. Biswas,et al. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography , 2013, Int. J. Comput. Math..
[45] Pierrick Gaudry,et al. An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves , 2000, EUROCRYPT.
[46] G. P. Biswas,et al. Certificateless strong designated verifier multisignature scheme using bilinear pairings , 2012, ICACCI '12.
[47] Kyung-Ah Shim,et al. Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order , 2008, Comput. Stand. Interfaces.
[48] Tzonelih Hwang,et al. Identity-based conference key broadcast systems , 1994 .
[49] Jianhua Chen,et al. An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.
[50] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[51] Paulo S. L. M. Barreto,et al. On the Selection of Pairing-Friendly Groups , 2003, Selected Areas in Cryptography.