A novel certificateless deniable authentication protocol
暂无分享,去创建一个
Xiaojun Zhang | Chunhua Jin | Fagen Li | Chunxiang Xu | Qianna Xie | Qianna Xie | Chunxiang Xu | Fagen Li | Xiaojun Zhang | Chunhua Jin
[1] Chris Xu,et al. Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .
[2] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[3] Yalin Chen,et al. A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..
[4] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[5] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[6] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[7] Yonatan Aumann,et al. Authentication, enhanced security and error correcting codes , 1998 .
[8] Youngho Park,et al. An Enhanced ID-Based Deniable Authentication Protocol on Pairings , 2007, ICCSA.
[9] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[10] Chunhua Jin,et al. Identity-based deniable authentication for ad hoc networks , 2013, Computing.
[11] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Eun-Jun Yoon,et al. Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm , 2005, Appl. Math. Comput..
[14] Xu Chongxiang. Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .
[15] Jianhua Li,et al. Identity-based deniable authentication protocol , 2005 .
[16] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[17] Maede Ashouri-Talouki,et al. Anonymous Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks , 2014, MUE 2014.
[18] Shin-Jia Hwang,et al. Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections , 2013 .
[19] Dongdai Lin,et al. An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[20] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[21] Xiaohui Liang,et al. A simple deniable authentication protocol based on the Diffie–Hellman algorithm , 2008, Int. J. Comput. Math..
[22] Sanggon Lee,et al. Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[23] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[24] Bin Wang,et al. A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..
[25] Zuhua Shao. Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.
[26] Yi Liu,et al. Security Analysis of a Suite of Deniable Authentication Protocols , 2013, Int. J. Netw. Secur..
[27] Zhenfu Cao,et al. A New ID-Based Deniable Authentication Protocol , 2007, Informatica.
[28] Yalin Chen,et al. ECC-Based Non-Interactive Deniable Authentication with Designated Verifier , 2013, IACR Cryptol. ePrint Arch..
[29] Haibo Tian,et al. Non-interactive Deniable Authentication Protocols , 2011, Inscrypt.