Secure Certificateless Signature with Revocation in the Standard Model
暂无分享,去创建一个
[1] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[2] Yi Mu,et al. Improved certificateless signature scheme provably secure in the standard model , 2012, IET Inf. Secur..
[3] Guomin Yang,et al. Strongly secure certificateless key exchange without pairing , 2011, ASIACCS '11.
[4] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[5] Qiaoyan Wen,et al. On the security of a certi cateless signature scheme in the standard model , 2013, IACR Cryptology ePrint Archive.
[6] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[7] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] Xinpeng Zhang,et al. New Fuzzy Identity-Based Encryption in the Standard Model , 2010, Informatica.
[10] Joseph K. Liu,et al. Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model , 2007, IACR Cryptol. ePrint Arch..
[11] Da Li,et al. Certificateless Signature Scheme without Random Oracles , 2009, ISA.
[12] Limin Shen,et al. Efficient Revocable Certificateless Encryption Secure in the Standard Model , 2014, Comput. J..
[13] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[14] Jianhong Zhang,et al. Security Analysis of Two Signature Schemes and Their Improved Schemes , 2007, ICCSA.
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[16] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[17] Fagen Li,et al. An Improved Certificateless Signature Scheme Secure in the Standard Model , 2008, Fundam. Informaticae.
[18] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[19] Rosario Gennaro,et al. Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement , 2010, Pairing.
[20] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[21] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[22] Yuh-Min Tseng,et al. Efficient Revocable ID-Based Encryption with a Public Channel , 2012, Comput. J..
[23] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[24] Kenneth G. Paterson,et al. An Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[25] Qi Xia,et al. Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles , 2010 .
[26] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[27] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[28] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.
[29] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[30] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[31] Kenneth G. Paterson,et al. CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.
[32] Yuh-Min Tseng,et al. Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.
[33] Kyung-Ah Shim,et al. Breaking the short certificateless signature scheme , 2009, Inf. Sci..
[34] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[35] Gwoboa Horng,et al. Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes , 2013, IACR Cryptol. ePrint Arch..
[36] Yuh-Min Tseng,et al. RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE , 2014, Informatica.