Key-insulated aggregate signature
暂无分享,去创建一个
[1] Han-Yu Lin,et al. New Efficient Identity-Based Key-Insulated Multisignature Scheme , 2013 .
[2] Rong Hao,et al. Intrusion-resilient identity-based signature: Security definition and construction , 2012, J. Syst. Softw..
[3] Rong Hao,et al. Forward-Secure Identity-Based Public-Key Encryption without Random Oracles , 2011, Fundam. Informaticae.
[4] Yu,et al. Identity-based threshold key-insulated signature , 2012 .
[5] Chunxiang Xu,et al. New forward-secure signature schemes with untrusted update , 2013, Frontiers of Computer Science.
[6] Sharon Goldberg,et al. Sequential aggregate signatures with lazy verification from trapdoor permutations , 2014, Inf. Comput..
[7] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[8] Brent Waters,et al. Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.
[9] Shouhuai Xu,et al. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software , 2012, ASIACCS '12.
[10] Jian Weng,et al. Strong key-insulated signature in the standard model , 2010 .
[11] Yuan Zhou,et al. Identity Based Key Insulated Signature , 2006, ISPEC.
[12] Rong Hao,et al. Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..
[13] Yuh-Min Tseng,et al. ID-based key-insulated signature scheme with batch verifications and its novel application , 2012 .
[14] Claudio Soriente,et al. Intrusion-resilient integrity in data-centric unattended WSNs , 2011, Pervasive Mob. Comput..
[15] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[16] Jian Weng,et al. Parallel key-insulated signature: Framework and construction , 2008 .
[17] Rafail Ostrovsky,et al. Sequential Aggregate Signatures and Multisignatures Without Random Oracles , 2006, EUROCRYPT.
[18] Di Ma,et al. Practical forward secure sequential aggregate signatures , 2008, ASIACCS '08.
[19] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[20] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[21] Dominique Schröder,et al. How to Aggregate the CL Signature Scheme , 2011, ESORICS.
[22] Veronika Kuchta,et al. Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions , 2013, CANS.
[23] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[24] Yoojae Won,et al. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security , 2012 .
[25] Yu Jia,et al. Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model , 2014 .
[26] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[27] Hideki Imai,et al. Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.
[28] Rong Hao,et al. One forward-secure signature scheme using bilinear maps and its applications , 2014, Inf. Sci..
[29] Kyung-Ah Shim. An ID-based aggregate signature scheme with constant pairing computations , 2010, J. Syst. Softw..
[30] Stanislaw Jarecki,et al. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.