Forward-secure multisignature and blind signature schemes
暂无分享,去创建一个
Siu-Ming Yiu | K. P. Chow | Sherman S. M. Chow | Lucas Chi Kwong Hui | L. Hui | S. Yiu | K. Chow | K. Chow
[1] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[2] K. Ohta,et al. Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security) , 1999 .
[3] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[4] Siu-Ming Yiu,et al. Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.
[5] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[6] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[7] Alexandra Boldyreva,et al. Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .
[8] David Chaum,et al. Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.
[9] Jung Hee Cheon,et al. A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption , 2003, ICICS.
[10] Fei Hu,et al. A New Forward Secure Signature Scheme using Bilinear Maps , 2003, IACR Cryptol. ePrint Arch..
[11] Silvio Micali,et al. Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.
[12] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[13] Chin-Laung Lei,et al. A Secure and Practical Electronic Voting Scheme for Real World Environments , 1997 .
[14] Siu-Ming Yiu,et al. Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.
[15] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[16] Je Hong Park,et al. A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..
[17] S. Micali,et al. Accountable-Subgroup Multisignatures , 2001 .
[18] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[19] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[20] Lihua Liu,et al. Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al , 2004, IACR Cryptol. ePrint Arch..
[21] Claus-Peter Schnorr,et al. Security of Blind Discrete Log Signatures against Interactive Attacks , 2001, ICICS.
[22] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[23] Leonid Reyzin,et al. Forward-Secure Signatures with Fast Key Update , 2002, SCN.
[24] K. Itakura,et al. A public-key cryptosystem suitable for digital multisignatures , 1983 .
[25] Ross J. Anderson,et al. Two remarks on public key cryptology , 2002 .
[26] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[27] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[28] M. Michels,et al. Hidden signature schemes based on the discrete logarithm problem and related concepts , 1995 .
[29] Chanathip Namprempre,et al. Forward-Secure Threshold Signature Schemes , 2001, CT-RSA.