Provably Secure Convertible Nominative Signature Scheme
暂无分享,去创建一个
[1] Yi Mu,et al. On the Security of Nominative Signatures , 2005, ACISP.
[2] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[3] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[4] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[5] Kaoru Kurosawa,et al. 3-Move Undeniable Signature Scheme , 2005, EUROCRYPT.
[6] Feng Bao,et al. Security Remarks on a Convertible Nominative Signature Scheme , 2007, SEC.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[9] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[10] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[11] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[12] Yumin Wang,et al. Convertible Nominative Signatures , 2004, ACISP.
[13] Tsuyoshi Takagi,et al. Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings , 2007, Pairing.
[14] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[15] Yi Mu,et al. Formal Definition and Construction of Nominative Signature , 2007, ICICS.
[16] Duncan S. Wong,et al. Further Discussions on the Security of a Nominative Signature Scheme , 2007, Security and Management.
[17] Yi Mu,et al. Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length , 2007, Pairing.
[18] Duncan S. Wong,et al. An efficient one-move Nominative Signature scheme , 2008, Int. J. Appl. Cryptogr..
[19] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[20] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.