A certificate-based proxy signature with message recovery without bilinear pairing
暂无分享,去创建一个
[1] Je Hong Park,et al. A Certificate-Based Signature Scheme , 2004, CT-RSA.
[2] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[3] Yi Mu,et al. Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.
[4] Sahadeo Padhye,et al. ECDLP‐based certificateless proxy signature scheme with message recovery , 2015, Trans. Emerg. Telecommun. Technol..
[5] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[6] L. Huang,et al. Cryptanalysis of an ID-based proxy signature scheme with message recovery , 2012 .
[7] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[8] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[9] Jianhua Chen,et al. An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.
[10] Joonsang Baek,et al. Certificate-Based Signature Schemes without Pairings or Random Oracles , 2008, ISC.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] R. A. Rueppel,et al. Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.
[13] Lizhong Xu,et al. Provably Secure Certificate-based Proxy Signature Schemes , 2009, J. Comput..
[14] Zhenfu Cao,et al. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power , 2007, INDOCRYPT.
[15] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[16] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[17] Zhenjie Huang,et al. Certificate-based proxy signature , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[18] Qian Liu,et al. A certificate-based strong designated verifier proxy signature scheme , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[19] Debiao He,et al. On the Security of a Certificateless Proxy Signature Scheme with Message Recovery , 2013 .
[20] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .