Efficient ID-based multiproxy multisignature without bilinear maps in ROM
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Min-Shiang Hwang,et al. An Ordered Multi-proxy Multi-signature Scheme , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[3] Sahadeo Padhye,et al. An ID-based multi-proxy multi-signature scheme , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[4] Kefei Chen,et al. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..
[5] Hwang Shin-Jia,et al. New multi-proxy multi-signature schemes , 2004 .
[6] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[7] Ashutosh Saxena,et al. C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK , 2008 .
[8] Zhenfu Cao,et al. An Efficient ID-Based Multi-proxy Multi-Signature Scheme , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[9] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[10] Lifeng Guo,et al. Insider attacks on multi-proxy multi-signature schemes , 2007, Comput. Electr. Eng..
[11] Yuh-Dauh Lyuu,et al. Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes , 2005, Appl. Math. Comput..
[12] He Debiao,et al. An ID-based proxy signature schemes without bilinear pairings , 2011 .
[13] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[14] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..
[15] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[16] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .