Short Transitive Signatures for Directed Trees
暂无分享,去创建一个
[1] Jia Xu. On Directed Transitive Signature , 2009, IACR Cryptol. ePrint Arch..
[2] Xun Yi. Directed Transitive Signature Scheme , 2007, CT-RSA.
[3] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[4] Claudio Soriente,et al. An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials , 2009, IACR Cryptol. ePrint Arch..
[5] Edward Fredkin,et al. Trie memory , 1960, Commun. ACM.
[6] Mihir Bellare,et al. Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.
[7] Mahmoud Salmasizadeh,et al. A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs , 2004, SCN.
[8] Silvio Micali,et al. Transitive Signature Schemes , 2002, CT-RSA.
[9] M. V. Wilkes,et al. The Art of Computer Programming, Volume 3, Sorting and Searching , 1974 .
[10] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[11] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[12] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[13] Susan Rae Hohenberger,et al. The cryptographic impact of groups with infeasible inversion , 2003 .
[14] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[15] Richard Cole,et al. Two Simplified Algorithms for Maintaining Order in a List , 2002, ESA.
[16] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[17] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[18] Paul F. Dietz. Maintaining order in a linked list , 1982, STOC '82.
[19] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[20] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[21] Gregory Neven. A simple transitive signature scheme for directed trees , 2008, Theor. Comput. Sci..
[22] Michael T. Goodrich,et al. An Efficient Dynamic and Distributed Cryptographic Accumulator , 2002, ISC.