Aggregate Signature without Pairing from Certificateless Cryptography
暂无分享,去创建一个
Yixian Yang | Lunzhi Deng | Xiong Wang | Yuling Chen | Yixian Yang | Yuling Chen | Lunzhi Deng | Xiong Wang
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[3] Ricardo Dahab,et al. Efficient Certificateless Signatures Suitable for Aggregation , 2007, IACR Cryptol. ePrint Arch..
[4] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[5] Jianhong Zhang,et al. An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..
[6] Zhong Chen,et al. Provably secure and efficient certificateless authenticated tripartite key agreement protocol , 2012, Math. Comput. Model..
[7] Rui Zhang,et al. An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..
[8] Lei Zhang,et al. A new certificateless aggregate signature scheme , 2009, Comput. Commun..
[9] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[10] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[11] Liming Zhou,et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme , 2015, Inf. Sci..
[12] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[13] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[14] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[15] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[16] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[17] Jianhua Chen,et al. An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.
[18] Limin Shen,et al. Notes on the security of certificateless aggregate signature schemes , 2014, Inf. Sci..
[19] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[20] Ji Geng,et al. A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security , 2015, KSII Trans. Internet Inf. Syst..
[21] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[22] Zhi Guan,et al. An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..
[23] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .