Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments
暂无分享,去创建一个
[1] Jan Camenisch,et al. Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data , 2009, Public Key Cryptography.
[2] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[3] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[4] David Mazières,et al. Proactive Two-Party Signatures for User Authentication , 2003, NDSS.
[5] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[6] R. Dahab,et al. Blinded-key signatures: securing private keys embedded in mobile agents , 2002, SAC '02.
[7] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.