An Efficient Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
暂无分享,去创建一个
[1] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[2] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[3] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[4] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[5] Arati Baliga,et al. An identity-based security framework For VANETs , 2006, VANET '06.
[6] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[8] Yuguang Fang,et al. An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[9] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[10] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[11] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[12] Craig Gentry,et al. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.
[13] Arati Baliga,et al. Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.
[14] Sahadeo Padhye,et al. A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..
[15] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[16] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[17] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[18] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[19] Andrew S. Tanenbaum,et al. An Identity-based Ring Signature Scheme with Enhanced Privacy , 2006, 2006 Securecomm and Workshops.
[20] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[21] Xiaotie Deng,et al. Certificateless signature: a new security model and an improved generic construction , 2007, Des. Codes Cryptogr..
[22] Lei Zhang,et al. A new certificateless aggregate signature scheme , 2009, Comput. Commun..
[23] Yi Mu,et al. On the security of a certificateless signcryption scheme , 2013, 2014 IEEE Workshop on Electronics, Computer and Applications.
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[26] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[27] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[28] Fagen Li,et al. Certificateless threshold signature secure in the standard model , 2013, Inf. Sci..
[29] Stanislaw Jarecki,et al. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.