An Efficient ID-Based Proxy Signcryption Scheme
暂无分享,去创建一个
P. Vasudeva Reddy | T. Gowri | G. Swapna | P. Gopal | P. Gopal | P. V. Reddy | T. Gowri | G. Swapna
[1] Muhammad Khurram Khan,et al. A Survey of Identity-based Signcryption , 2011 .
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[4] C. Pandu Rangan,et al. Identity Based Public Verifiable Signcryption Scheme , 2010, ProvSec.
[5] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[6] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[7] Sunder Lal,et al. Efficient Identity Based Public Verifiable Signcryption Scheme , 2011, ArXiv.
[8] Meng Wang,et al. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.
[9] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[10] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[11] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[12] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[13] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[14] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[15] Ashutosh Saxena,et al. A Survey on ID-Based Cryptographic Primitives , 2005, IACR Cryptol. ePrint Arch..
[16] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[17] Zhenfu Cao,et al. Two Proxy Signcryption Schemes from Bilinear Pairings , 2005, CANS.
[18] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[19] Joonsang Baek,et al. A Survey of Identity-Based Cryptography , 2004 .
[20] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[21] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.