Identity-based proxy signatures: a generic construction and a concrete scheme from RSA
暂无分享,去创建一个
Colin Boyd | Mahmoud Salmasizadeh | Maryam Rajabzadeh Asaar | M. R. Asaar | M. Salmasizadeh | C. Boyd
[1] Yuefei Zhu,et al. Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.
[2] Zuhua Shao,et al. Provably secure proxy-protected signature schemes based on RSA , 2009, Comput. Electr. Eng..
[3] Kyung-Ah Shim,et al. An Identity-Based Proxy Signature Scheme from Pairings , 2006, ICICS.
[4] Xiaoming Hu,et al. Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Takeshi Okamoto,et al. Extended Proxy Signatures for Smart Cards , 1999, ISW.
[6] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[7] Je Hong Park,et al. Cryptanalysis of Zhou et al.'s proxy-protected signature schemes , 2005, Appl. Math. Comput..
[8] Yuan Zhou,et al. Provably secure proxy-protected signature schemes based on factoring , 2005, Appl. Math. Comput..
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[11] Eun-Jun Yoon,et al. New ID-Based Proxy Signature Scheme with Message Recovery , 2013, GPC.
[12] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[13] Yong Yu,et al. Designated verifier proxy signature scheme without random oracles , 2009, Comput. Math. Appl..
[14] Jianhong Zhang,et al. Another ID-based proxy signature scheme and its extension , 2006, Wuhan University Journal of Natural Sciences.
[15] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[16] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[17] Xavier Boyen,et al. The Uber-Assumption Family , 2008, Pairing.
[18] Weijia Jia,et al. Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..
[19] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[20] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[21] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[22] Yi Mu,et al. Identity-Based Proxy Signature from Pairings , 2007, ATC.
[23] Mihir Bellare,et al. Identity-Based Multi-signatures from RSA , 2007, CT-RSA.
[24] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[25] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[26] Yi Mu,et al. A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.
[27] Yuefei Zhu,et al. An Efficient ID-Based Proxy Signature Scheme from Pairings , 2007, Inscrypt.
[28] L. Huang,et al. Cryptanalysis of an ID-based proxy signature scheme with message recovery , 2012 .
[29] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[30] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[31] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[32] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[33] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[34] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[35] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[36] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[37] Javier Herranz,et al. On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.
[38] Zhenfu Cao,et al. Factoring based proxy signature schemes , 2006 .
[39] Yongjuan Wang,et al. An Identity-Based Proxy Signature from Bilinear Pairings , 2009, 2009 WASE International Conference on Information Engineering.
[40] Zuhua Shao,et al. Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..