Certificateless undeniable signature scheme
暂无分享,去创建一个
[1] Kaoru Kurosawa,et al. The security of the FDH variant of Chaum's undeniable signature scheme , 2006, IEEE Trans. Inf. Theory.
[2] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[3] Ivan Bjerre Damgård,et al. Advances in Cryptology — EUROCRYPT ’90 , 2001, Lecture Notes in Computer Science.
[4] Narn-Yih Lee,et al. Convertible undeniable signature with subliminal channels , 2004, Appl. Math. Comput..
[5] Serge Vaudenay,et al. Undeniable Signatures Based on Characters: How to Sign with One Bit , 2004, Public Key Cryptography.
[6] Guomin Yang,et al. An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices , 2007, WINE.
[7] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[8] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[9] Tatsuaki Okamoto,et al. Designated Confirmer Signatures and Public-Key Encryption are Equivalent , 1994, CRYPTO.
[10] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[11] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[12] Steven D. Galbraith,et al. Invisibility and Anonymity of Undeniable and Confirmer Signatures , 2003, CT-RSA.
[13] Zhenfu Cao,et al. Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..
[14] Markus Jakobsson,et al. Blackmailing using Undeniable Signatures , 1994, EUROCRYPT.
[15] Zhixiong Chen,et al. Convertible undeniable partially blind signatures , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[16] Tsuyoshi Takagi,et al. Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders , 2004, Des. Codes Cryptogr..
[17] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[18] Joonsang Baek,et al. Identity-based threshold signature scheme from the bilinear pairings (extended abstract) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[19] Kenneth G. Paterson,et al. RSA-Based Undeniable Signatures for General Moduli , 2002, CT-RSA.
[20] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[23] Jean-Jacques Quisquater,et al. Identity Based Undeniable Signatures , 2004, CT-RSA.
[24] David Chaum,et al. Designated Confirmer Signatures , 1994, EUROCRYPT.
[25] Jinn-ke Jan,et al. A Novel ID-based Group Signature , 1999, Inf. Sci..
[26] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[27] Frederik Vercauteren,et al. A Fault Attack on Pairing-Based Cryptography , 2006, IEEE Transactions on Computers.
[28] Javier Herranz,et al. Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..
[29] Kenneth G. Paterson,et al. CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.
[30] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[31] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[32] Pil Joong Lee,et al. Identity-Based Cryptography in Public Key Management , 2004, EuroPKI.
[33] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.