Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

[1]  Christopher Wolf,et al.  Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important , 2012, AFRICACRYPT.

[2]  Jiguo Li,et al.  Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..

[3]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[4]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[5]  Bo-Yin Yang,et al.  Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.

[6]  Luk Bettale,et al.  Hybrid approach for solving multivariate systems over finite fields , 2009, J. Math. Cryptol..

[7]  Stanislav Bulygin,et al.  A multivariate based threshold ring signature scheme , 2013, Applicable Algebra in Engineering, Communication and Computing.

[8]  Louis Goubin,et al.  Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.

[9]  Adi Shamir,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[10]  Xiaolei Dong,et al.  Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Daojing He,et al.  Online/offline signature based on UOV in wireless sensor networks , 2016, Wireless Networks.

[12]  J. Faugère A new efficient algorithm for computing Gröbner bases (F4) , 1999 .

[13]  Shaohua Tang,et al.  HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere , 2017, KSII Trans. Internet Inf. Syst..

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Lei Hu,et al.  High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems , 2007, Public Key Cryptography.

[16]  Nicolas Courtois,et al.  Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank , 2001, ASIACRYPT.

[17]  Chik How Tan,et al.  Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem , 2018 .

[18]  Xiaolei Dong,et al.  White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively , 2018, IEEE Transactions on Dependable and Secure Computing.

[19]  Yang Lu,et al.  Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.

[20]  Xiaolei Dong,et al.  White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Louis Goubin,et al.  QUARTZ, 128-Bit Long Digital Signatures , 2001, CT-RSA.

[22]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[23]  Shaohua Tang,et al.  Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials , 2014, Future Gener. Comput. Syst..

[24]  Jiguo Li,et al.  A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..