A secure extension of the Kwak-Moon group signcryption scheme
暂无分享,去创建一个
[1] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[2] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.
[3] Dongho Won,et al. Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices , 2004, IACR Cryptol. ePrint Arch..
[4] Yi Mu,et al. Distributed Signcryption , 2000, INDOCRYPT.
[5] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[6] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[7] J. Camenisch,et al. A Group Signature Scheme Based on an RSA-Variant , 1998 .
[8] Toru Nakanishi,et al. A Group Signature Scheme Committing the Group , 2002, ICICS.
[9] Emmanuel Bresson,et al. Mutual authentication and group key agreement for low-power mobile devices , 2003, Comput. Commun..
[10] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[11] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[12] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[13] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[14] Dong Jin Kwak,et al. Efficient Distributed Signcryption Scheme as Group Signcryption , 2003, ACNS.
[15] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[16] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[17] Robert H. Deng,et al. Security Analysis of Two Signcryption Schemes , 2004, ISC.
[18] Toru Nakanishi,et al. Anonymous Statistical Survey of Attributes , 2001, ACISP.
[19] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[20] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[21] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[22] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.