An improved efficient identity-based proxy signature in the standard model
暂无分享,去创建一个
Xiaoming Hu | Jian Wang | Huajie Xu | Yinchun Yang | Xiaolin Xu | Huajie Xu | Xiaoming Hu | Jian Wang | Yinchun Yang | Xiaolin Xu
[1] Yupu Hu,et al. New Identity-based Short Signature Without Random Oracles , 2011 .
[2] Javier Herranz,et al. On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.
[3] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[4] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Mihir Bellare,et al. An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem , 2004, EUROCRYPT.
[7] Yuh-Min Tseng,et al. Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.
[8] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[9] Fengtong Wen,et al. An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .
[10] Fagen Li,et al. Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model , 2013, Secur. Commun. Networks.
[11] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[12] Weijia Jia,et al. Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..
[13] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[14] Yong Yu,et al. On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[16] Yuefei Zhu,et al. Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.
[17] Li Xu,et al. Identity-Based Proxy Signature for Cloud Service in SaaS , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[18] Dowon Hong,et al. Identity-based proxy signature from lattices , 2013, Journal of Communications and Networks.
[19] Zhenfu Cao,et al. An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.
[20] Tsz Hon Yuen,et al. Efficient Hierarchical Identity Based Signature in the Standard Model , 2007, IACR Cryptol. ePrint Arch..
[21] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[22] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.