Cryptanalysis and improvement of an efficient certificateless signature scheme
暂无分享,去创建一个
Yi Mu | Xinyi Huang | Wei Wu | Jiguo Li | Y. Mu | Wei Wu | Xinyi Huang | Jiguo Li
[1] Richard Comley,et al. Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[2] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[3] Dengguo Feng,et al. Key Replacement Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[4] Yi Mu,et al. Certificateless Designated Verifier Signature Schemes , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[5] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[6] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[9] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[12] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[13] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[14] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[15] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[16] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[17] Kenneth G. Paterson,et al. CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.
[18] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[19] Zhenfu Cao,et al. Certificateless Threshold Signature Schemes , 2005, CIS.
[20] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[21] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[22] Bok-Min Goi,et al. An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..