Self-certified Signatures Based on Discrete Logarithms
暂无分享,去创建一个
[1] Zuhua Shao,et al. Self-certified signature scheme from pairings , 2007, J. Syst. Softw..
[2] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[5] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Byoungcheon Lee,et al. Self-certified Signatures , 2002, INDOCRYPT.
[9] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[12] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[13] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[14] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[15] Zhenfu Cao,et al. Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys , 2005, J. Syst. Softw..
[16] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[17] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[18] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[19] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[20] Z. Shao. Cryptographic systems using a self-certified public key based on discrete logarithms , 2001 .
[21] Chien-Lung Hsu,et al. Threshold signature scheme using self-certified public keys , 2003, J. Syst. Softw..
[22] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[23] Alfred Menezes,et al. Progress in Cryptology — INDOCRYPT 2002 , 2002, Lecture Notes in Computer Science.
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.