Efficient Hierarchical Identity Based Signature in the Standard Model
暂无分享,去创建一个
[1] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[4] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[5] Tsz Hon Yuen,et al. Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles , 2006, IACR Cryptol. ePrint Arch..
[6] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[7] Siu-Ming Yiu,et al. Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.
[8] Qing Wu,et al. New Construction of Short Hierarchical ID-Based Signature in the Standard Model , 2009, Fundam. Informaticae.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[11] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[12] Sanjit Chatterjee,et al. New Constructions of Constant Size Ciphertext HIBE Without Random Oracle , 2006, ICISC.
[13] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[14] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[15] Tsz Hon Yuen,et al. Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[16] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[17] Xiaoming Hu,et al. Practical Hierarchical Identity Based Encryption Scheme without Random Oracles , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[18] Parampalli Udaya,et al. Efficient identity-based signatures in the standard model , 2008, IET Inf. Secur..
[19] Jin Li,et al. A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE , 2006, EUC Workshops.