On the security of two identity-based signature schemes based on pairings
暂无分享,去创建一个
Chen Yuan | Zhen Qin | Yilei Wang | Hu Xiong | Yilei Wang | Chen Yuan | Zhen Qin | H. Xiong
[1] Daoxu Chen,et al. Correlations between characteristics of maximum influence and degree distributions in software networks , 2013, Science China Information Sciences.
[2] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] Craig Gentry,et al. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.
[6] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[7] Kyung-Ah Shim,et al. A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[8] Zhiguang Qin,et al. Analysis and improvement of a provable secure fuzzy identity-based signature scheme , 2014, Science China Information Sciences.
[9] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[10] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[13] Giovanni Schmid,et al. Identity-based secure group communications using pairings , 2015, Comput. Networks.