A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups
暂无分享,去创建一个
[1] Jian Liu,et al. against frame and collude attacks of third party auditor , 2014 .
[2] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[5] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[6] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[7] Ming Xu,et al. Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage , 2014, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[8] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[9] Jung Hee Cheon,et al. A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..
[10] Allison Bishop,et al. Dual Form Signatures: An Approach for Proving Security from Static Assumptions , 2012, IACR Cryptol. ePrint Arch..
[11] Xuejie Zhang,et al. Identity-Based Authentication in Cloud Storage Sharing , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[12] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[13] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[14] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[15] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[16] Siu-Ming Yiu,et al. Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.