Efficient Identity-Based Proxy Signature in the Standard Model
暂无分享,去创建一个
Weijia Jia | Ke Gu | Chunlin Jiang | Ke Gu | W. Jia | Chunlin Jiang
[1] Yuefei Zhu,et al. Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.
[2] Shin-Jia Hwang,et al. New threshold-proxy threshold-signature schemes , 2005, Comput. Electr. Eng..
[3] Reihaneh Safavi-Naini,et al. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..
[4] Chien-Lung Hsu,et al. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..
[5] Yi Mu,et al. Strongly unforgeable proxy signature scheme secure in the standard model , 2011, J. Syst. Softw..
[6] Qiaoyan Wen,et al. Certificateless multi-proxy signature , 2011, Comput. Commun..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] L. Harn,et al. Efficient one-time proxy signatures , 2005 .
[9] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[10] Takeshi Okamoto,et al. A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[11] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[12] Georg Fuchsbauer,et al. Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures , 2009, IACR Cryptol. ePrint Arch..
[13] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[14] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[15] Fagen Li,et al. A Provably Secure Proxy Signature Scheme in Certificateless Cryptography , 2010, Informatica.
[16] Jianhong Zhang,et al. Another Efficient Proxy Signature Scheme in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.
[17] Zhijian Wang,et al. A provably secure proxy signature scheme from bilinear pairings , 2010 .
[18] Yi Mu,et al. Identity-Based Proxy Signature from Pairings , 2007, ATC.
[19] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..
[20] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[21] Tsz Hon Yuen,et al. ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.
[22] Yupu Hu,et al. Provably secure multi-proxy signature scheme with revocation in the standard model , 2011, Comput. Commun..
[23] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.
[24] Hu Jianghong. Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme , 2012 .
[25] Lizhong Xu,et al. Provably Secure Certificate-based Proxy Signature Schemes , 2009, J. Comput..
[26] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[27] Zuhua Shao,et al. Provably secure proxy-protected signature schemes based on RSA , 2009, Comput. Electr. Eng..
[28] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[29] Ziba Eslami,et al. A Certificateless Proxy Signature Scheme Secure In Standard Model , 2012 .
[30] Harendra Singh,et al. ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..
[31] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[32] Germán Sáez,et al. Revisiting Fully Distributed Proxy Signature Schemes , 2004, INDOCRYPT.
[33] Yi Mu,et al. Provably secure proxy signature scheme from factorization , 2012, Math. Comput. Model..
[34] Yuefei Zhu,et al. An Efficient ID-Based Proxy Signature Scheme from Pairings , 2007, Inscrypt.
[35] Fengtong Wen,et al. An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .
[36] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[37] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[38] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[39] Zhenfu Cao,et al. An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.
[40] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[41] Yi Mu,et al. A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.
[42] Fengtong Wen,et al. Improvement of a forward-secure proxy signature scheme , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[43] Yi Mu,et al. Proxy Signature Without Random Oracles , 2006, MSN.
[44] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[45] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[46] Zhong Chen,et al. On the security of an identity based multi-proxy signature scheme , 2011, Comput. Electr. Eng..