Efficient online/offline signcryption without key exposure
暂无分享,去创建一个
[1] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[2] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[3] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[4] Yi Mu,et al. Reducing security overhead for mobile networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[5] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[6] Dongqing Xie,et al. Divisible On-Line/Off-Line Signatures , 2009, CT-RSA.
[7] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[8] Xiaofeng Chen,et al. Efficient Online/Offline Signcryption Scheme , 2010, Intell. Autom. Soft Comput..
[9] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[10] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..
[11] Yi Mu,et al. Efficient generic on-line/off-line (threshold) signatures without key exposure , 2008, Inf. Sci..
[12] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[13] A. Shamir,et al. Improved On-line / Off-line Signature Schemes , 2022 .
[14] Yi Mu,et al. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.
[15] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[16] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[17] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[18] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[19] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[20] Yuliang Zheng,et al. Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite , 2001, Public Key Cryptography.
[21] Lein Harn,et al. Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families , 2010, Comput. J..
[22] Fuchun Guo,et al. Optimal Online/Offline Signature: How to Sign a Message without Online Computation , 2008, ProvSec.
[23] Yi Mu,et al. Identity-Based On-Line/Off-Line Signcryption , 2008, 2008 IFIP International Conference on Network and Parallel Computing.
[24] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[25] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[26] Fuchun Guo,et al. Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.
[27] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[28] Joonsang Baek,et al. Online/Offline Identity-Based Signcryption Revisited , 2010, Inscrypt.
[29] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[30] Joseph K. Liu,et al. An Efficient Identity-Based Online/Offline Encryption Scheme , 2009, ACNS.