A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model
暂无分享,去创建一个
Wei Li | Jiwen Zeng | Yingying Zhang | Wei Li | Jiwen Zeng | Huilin Zhu | Yingying Zhang | Huilin Zhu
[1] Tsz Hon Yuen,et al. ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.
[2] Lei Zhang,et al. On the security of a certificateless signature scheme , 2010, 2010 2nd International Conference on Signal Processing Systems.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] W. Wenqiang,et al. Attribute-based ring signature scheme with constant-size signature , 2010 .
[5] Wang Yu-Min. Identity-based ring signature scheme under standard model , 2008 .
[6] Huaqun Wang,et al. A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography , 2010, 2010 International Conference of Information Science and Management Engineering.
[7] Fan Hong,et al. A forward certificateless ring signature scheme , 2011, 2011 International Conference on Multimedia Technology.
[8] Dengguo Feng,et al. A Ring Signature Scheme Using Bilinear Pairings , 2004, WISA.
[9] Raylin Tso,et al. Certificateless signatures with message recovery , 2014 .
[10] Sherman S. M. Chow,et al. Certificateless Ring Signatures , 2007, IACR Cryptol. ePrint Arch..
[11] Rui Zhang,et al. An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..
[12] Hovav Shacham,et al. Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.
[13] Yi Mu,et al. Certificateless Threshold Ring Signature , 2009, Inf. Sci..
[14] Lunzhi Deng,et al. Certificateless ring signature based on RSA problem and DL problem , 2015, RAIRO Theor. Informatics Appl..
[15] Lunzhi Deng,et al. Two new identity-based threshold ring signature schemes , 2014, Theor. Comput. Sci..
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Tang Chun-ming,et al. An improved identity-based ring signature scheme from bilinear pairings , 2005 .
[18] Chengyu Hu,et al. A new ID-based ring signature scheme with constant-size signature , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[19] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[20] Kyung-Ah Shim. An efficient ring signature scheme from pairings , 2015, Inf. Sci..
[21] Lei Guo,et al. Identity-based threshold ring signature scheme with constant signature size: Identity-based threshold ring signature scheme with constant signature size , 2013 .
[22] Tsz Hon Yuen,et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..
[23] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[24] Ting Yu,et al. Efficient identity-based ring signature in standard model: Efficient identity-based ring signature in standard model , 2013 .
[25] Tsz Hon Yuen,et al. Threshold ring signature without random oracles , 2011, ASIACCS '11.
[26] Pierre-Louis Cayrel,et al. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2008, IEEE Transactions on Information Theory.
[27] Fengyin Li,et al. An Efficient Certificateless Signature Scheme from Bilinear Parings , 2011, 2011 International Conference on Network Computing and Information Security.
[28] Javier Herranz. Identity-based ring signatures from RSA , 2007, Theor. Comput. Sci..
[29] Bok-Min Goi,et al. An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[30] Tzong-Chen Wu,et al. An identity-based ring signature scheme from bilinear pairings , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..