A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World
暂无分享,去创建一个
Yi Mu | Willy Susilo | Xinyi Huang | Xiaofeng Chen | Fangguo Zhang | Y. Mu | W. Susilo | Xinyi Huang | Fangguo Zhang | Xiaofeng Chen
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[3] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[4] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[5] Takeshi Okamoto,et al. A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[6] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[7] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[8] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[9] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[10] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[11] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[12] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[13] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[14] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[15] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[16] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.