Enforcing Policies in Content Manipulation Signature Schemes
暂无分享,去创建一个
[1] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[2] Michael Szydlo,et al. Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.
[3] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[4] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[5] Ravi Jain,et al. A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.
[6] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..