Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
暂无分享,去创建一个
Jie Ling | Jintai Ding | Jiahui Chen | Jianting Ning | Jintai Ding | Jianting Ning | Jie Ling | Jiahui Chen
[1] Christopher Wolf,et al. Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important , 2012, AFRICACRYPT.
[2] Jiguo Li,et al. Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..
[3] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[4] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[5] Bo-Yin Yang,et al. Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.
[6] Luk Bettale,et al. Hybrid approach for solving multivariate systems over finite fields , 2009, J. Math. Cryptol..
[7] Stanislav Bulygin,et al. A multivariate based threshold ring signature scheme , 2013, Applicable Algebra in Engineering, Communication and Computing.
[8] Louis Goubin,et al. Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.
[9] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[10] Xiaolei Dong,et al. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[11] Daojing He,et al. Online/offline signature based on UOV in wireless sensor networks , 2016, Wireless Networks.
[12] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[13] Shaohua Tang,et al. HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere , 2017, KSII Trans. Internet Inf. Syst..
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Lei Hu,et al. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems , 2007, Public Key Cryptography.
[16] Nicolas Courtois,et al. Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank , 2001, ASIACRYPT.
[17] Chik How Tan,et al. Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem , 2018 .
[18] Xiaolei Dong,et al. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively , 2018, IEEE Transactions on Dependable and Secure Computing.
[19] Yang Lu,et al. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.
[20] Xiaolei Dong,et al. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes , 2015, IEEE Transactions on Information Forensics and Security.
[21] Louis Goubin,et al. QUARTZ, 128-Bit Long Digital Signatures , 2001, CT-RSA.
[22] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[23] Shaohua Tang,et al. Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials , 2014, Future Gener. Comput. Syst..
[24] Jiguo Li,et al. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..