An Attribute-Based Anonymous Authentication Scheme
暂无分享,去创建一个
[1] Germán Sáez,et al. Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures , 2003, Financial Cryptography.
[2] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[3] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[4] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[5] Hyunsoo Yoon,et al. A New Proxy Signature Scheme Providing Self-delegation , 2006, ICISC.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[9] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[10] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2007 .
[11] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..
[12] Zhenfu Cao,et al. Identity based proxy multi-signature , 2007, J. Syst. Softw..
[13] Robert H. Deng,et al. Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..
[14] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[15] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[16] Yuan Zhou,et al. Proxy blind multi-signature scheme without a secure channel , 2005, Appl. Math. Comput..
[17] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[18] Guo Shaniqng,et al. Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[19] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .