A Generic Construction of Proxy Signatures from Certificateless Signatures
暂无分享,去创建一个
Josep Domingo-Ferrer | Lei Zhang | Peng Zeng | Ruiying Du | Qianhong Wu | Bo Qin | Jianwei Liu | J. Domingo-Ferrer | Ruiying Du | Qianhong Wu | Jianwei Liu | Bo Qin | Lei Zhang | Peng Zeng
[1] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.
[2] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[3] Yi Mu,et al. A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.
[4] Lei Zhang,et al. Delegation of signing rights using certificateless proxy signatures , 2012, Inf. Sci..
[5] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Lei Zhang,et al. New Efficient Certificateless Signature Scheme , 2007, EUC Workshops.
[8] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[9] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[10] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[11] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[12] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[13] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[14] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[15] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[16] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[17] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[18] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[19] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .