Information Security and Cryptology
暂无分享,去创建一个
[1] Yi Mu,et al. Universal Designated Multi Verifier Signature Schemes , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[2] Li Xu,et al. A new universal designated verifier transitive signature scheme for big graph data , 2017, J. Comput. Syst. Sci..
[3] Reihaneh Safavi-Naini,et al. Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures , 2009, IET Inf. Secur..
[4] Silvio Micali,et al. Transitive Signature Schemes , 2002, CT-RSA.
[5] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[6] Yi Mu,et al. Identity-Based Universal Designated Verifier Signatures , 2005, EUC Workshops.
[7] Yi Mu,et al. Secure universal designated verifier signature without random oracles , 2008, International Journal of Information Security.
[8] Marek Klonowski,et al. Kleptographic Attacks on E-Voting Schemes , 2006, ETRICS.
[9] Zhenfu Cao,et al. Transitive Signatures from Braid Groups , 2007, INDOCRYPT.
[10] Anthony J. G. Hey,et al. Jim Gray on eScience: a transformed scientific method , 2009, The Fourth Paradigm.
[11] Paulo S. L. M. Barreto,et al. Fast hashing onto elliptic curves over fields of characteristic 3 , 2001, IACR Cryptol. ePrint Arch..
[12] Susan Rae Hohenberger,et al. The cryptographic impact of groups with infeasible inversion , 2003 .
[13] Yang Ming,et al. Universal designated multi verifier signature scheme without random oracles , 2008, Wuhan University Journal of Natural Sciences.
[14] Mihir Bellare,et al. Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.
[15] Ashutosh Saxena,et al. Universal Designated Multi Verifier Signature without Random Oracles , 2006, 9th International Conference on Information Technology (ICIT'06).
[16] Li Xu,et al. Universal designated verifier transitive signatures for graph-based big data , 2015, Inf. Sci..
[17] Joonsang Baek,et al. Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) , 2005, ASIACRYPT.
[18] Zheng Huang,et al. Transitive Signature Scheme from LFSR , 2010 .
[19] Jean-Jacques Quisquater,et al. Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions , 2006, SCN.
[20] Jin Li,et al. Universal Designated Verifier Ring Signature (Proof) Without Random Oracles , 2006, EUC Workshops.
[21] Fabien Laguillaumie,et al. On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures , 2007, ISC.
[22] Jia Xu. On Directed Transitive Signature , 2009, IACR Cryptol. ePrint Arch..
[23] Xun Yi. Directed Transitive Signature Scheme , 2007, CT-RSA.
[24] Yi Mu,et al. Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.
[25] Yi Mu,et al. Restricted Universal Designated Verifier Signature , 2006, UIC.
[26] Mihir Bellare,et al. Transitive Signatures Based on Factoring and RSA , 2002, ASIACRYPT.
[27] Miroslaw Kutylowski,et al. Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices , 2016, Mycrypt.
[28] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[29] Gregory Neven. A simple transitive signature scheme for directed trees , 2008, Theor. Comput. Sci..
[30] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[31] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[32] Philippe Camacho,et al. Short Transitive Signatures for Directed Trees , 2012, CT-RSA.
[33] Yi Mu,et al. Identity-based Universal Designated Verifier Signature Proof System , 2009, Int. J. Netw. Secur..