An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
暂无分享,去创建一个
[1] Yuqing Zhang,et al. An efficient and provable secure identity-based ring signcryption scheme , 2009, Comput. Stand. Interfaces.
[2] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[5] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[6] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[7] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[8] Jianhong Zhang,et al. A Novel ID-Based Anonymous Signcryption Scheme , 2009, APWeb/WAIM.
[9] Masakatsu Nishigaki,et al. Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings , 2011, IWSEC.
[10] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[11] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[12] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[13] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[14] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[15] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[16] Sunder Lal,et al. Anonymous ID Based Signcryption Scheme for Multiple Receivers , 2009, IACR Cryptol. ePrint Arch..
[17] Tsz Hon Yuen,et al. ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.
[18] Jeffrey Xu Yu,et al. Advances in Data and Web Management, Joint 9th Asia-Pacific Web Conference, APWeb 2007, and 8th International Conference, on Web-Age Information Management, WAIM 2007, Huang Shan, China, June 16-18, 2007, Proceedings , 2007, APWeb/WAIM.
[19] Zhenfu Cao,et al. Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.
[20] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[21] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[22] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[23] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[24] Fagen Li,et al. An efficient ID-based ring signcryption scheme , 2008, 2008 International Conference on Communications, Circuits and Systems.
[25] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[26] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[27] Yi Mu,et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[28] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[29] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[30] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[31] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[32] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.