An efficient RSA-based certificateless signature scheme
暂无分享,去创建一个
[1] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[2] Qiong Huang,et al. Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.
[3] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[4] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[5] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Da Li,et al. Certificateless Signature Scheme without Random Oracles , 2009, ISA.
[8] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[9] Mani Anand. Self generated certificate public key cryptography for e commerce , 2011 .
[10] Mihir Bellare,et al. Identity-Based Multi-signatures from RSA , 2007, CT-RSA.
[11] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[12] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[13] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[14] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[15] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[16] Jianhong Zhang,et al. Security Analysis of Two Signature Schemes and Their Improved Schemes , 2007, ICCSA.
[17] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[18] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[19] Robert H. Deng,et al. RSA-Based Certificateless Public Key Encryption , 2009, ISPEC.
[20] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[21] Antoine Joux,et al. Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups , 2001, IACR Cryptology ePrint Archive.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Jianhong Zhang,et al. Security Analysis and their Improvement of Two Signature Schemes , 2008, 2008 The 9th International Conference for Young Computer Scientists.