Reset-Secure Identity-Based Identification Schemes Without Pairings
暂无分享,去创建一个
[1] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Marc Fischlin,et al. Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.
[4] Kaoru Kurosawa,et al. From Digital Signature to ID-based Identification/Signature , 2004, Public Key Cryptography.
[5] Mihir Bellare,et al. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[8] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[9] Kaoru Kurosawa,et al. Identity-Based Identification Without Random Oracles , 2005, ICCSA.
[10] Ji-Jian Chin,et al. Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme , 2015, TheScientificWorldJournal.
[11] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[12] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[13] Yi Mu,et al. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles , 2009, WISA.