Self-certified keys — Concepts and Applications
暂无分享,去创建一个
[1] Patrick Horster,et al. A New Approach for Delegation Using Hierarchical Delegation Tokens , 1997, Communications and Multimedia Security.
[2] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[3] David M'Raïhi,et al. Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.
[4] Tatsuaki Okamoto,et al. Practical Escrow Cash System , 1996, Security Protocols Workshop.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] S. Vanstone,et al. Improved digital signature scheme based on discrete exponentiation , 1990 .
[7] Markus Jakobsson,et al. Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.
[8] Guillaume Poupard,et al. Efficient scalable fair cash with off-line extortion prevention , 1997, ICICS.
[9] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[10] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[11] A. K. Lenstra,et al. Multi-exponentiation (cryptographic protocols) , 1994 .
[12] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[13] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[14] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[15] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[16] Yacov Yacobi,et al. On Key Distribution Systems , 1989, CRYPTO.
[17] Patrick Horster,et al. Meta-ElGamal signature schemes , 1994, CCS '94.
[18] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[19] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[20] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[21] M. Michels,et al. Hidden signature schemes based on the discrete logarithm problem and related concepts , 1995 .
[22] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[23] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[24] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.