A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant
暂无分享,去创建一个
[1] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[2] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[3] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[4] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[5] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[6] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[7] Hassan M. Elkamchouchi,et al. A new proxy signcryption scheme using warrants , 2011, Int. J. Intell. Eng. Informatics.
[8] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[9] Yang Ming,et al. Proxy signcryption scheme in the standard model , 2015, Secur. Commun. Networks.
[10] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[11] Han-Yu Lin,et al. An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce , 2012, J. Inf. Sci. Eng..
[12] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[13] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[14] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[15] Qiaoyan Wen,et al. An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..
[16] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[17] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[18] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[19] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[20] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[21] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[22] Hassan M. Elkamchouchi,et al. An Efficient Proxy Signcryption Scheme Based on the Discrete Logarithm Problem , 2013 .