A highly efficient and identity-based proxy signature scheme without random oracle
暂无分享,去创建一个
Xiaoming Hu | Jian Wang | Yinchun Yang | Yan Liu | Xiaohua Xiong | Xiaoming Hu | Jian Wang | Yinchun Yang | Yan Liu | Xiaohua Xiong
[1] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[2] Zhenfu Cao,et al. An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.
[3] Tsz Hon Yuen,et al. Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles , 2006, IACR Cryptol. ePrint Arch..
[4] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[5] Tsz Hon Yuen,et al. Efficient Hierarchical Identity Based Signature in the Standard Model , 2007, IACR Cryptol. ePrint Arch..
[6] Li Xu,et al. Identity-Based Proxy Signature for Cloud Service in SaaS , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[7] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[8] Weijia Jia,et al. Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..
[9] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[10] Dowon Hong,et al. Identity-based proxy signature from lattices , 2013, Journal of Communications and Networks.
[11] Fengtong Wen,et al. An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .
[12] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[13] Xiaoming Hu,et al. A novel proxy key generation protocol and its application , 2007, Comput. Stand. Interfaces.
[14] Yong Yu,et al. On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[16] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.