Cryptanalysis of Attribute-based Ring Signcryption Scheme
暂无分享,去创建一个
[1] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[2] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[3] Qiaoyan Wen,et al. An Improved Certificateless Signcryption in the Standard Model , 2015, Int. J. Netw. Secur..
[4] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[5] Robert H. Deng,et al. A secure extension of the Kwak-Moon group signcryption scheme , 2006, Comput. Secur..
[6] Zhong Chen,et al. Security Flaw of an ECC-based Signcryption Scheme with Anonymity , 2013, Int. J. Netw. Secur..
[7] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[8] Yong Yu,et al. Provably Secure Identity-Based Threshold Unsigncryption Scheme , 2007, ATC.
[9] Mohsen Toorani,et al. Cryptanalysis of an Elliptic Curve-based Signcryption Scheme , 2010, Int. J. Netw. Secur..
[10] Yuliang Zheng,et al. Practical Signcryption , 2010, Information Security and Cryptography.
[11] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[12] Xinyi Huang,et al. Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..
[13] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[14] Mingwu Zhang,et al. Notes on Proxy Signcryption and Multi-proxy Signature Schemes , 2015, Int. J. Netw. Secur..
[15] Fahad Bin Muhaya,et al. Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..
[16] Fagen Li,et al. A Pairing-Based Signcryption Scheme Using Self-Certified Public Keys , 2007 .
[17] Han-Yu Lin,et al. Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..
[18] Mingchu Li,et al. Attribute-based ring signcryption scheme , 2013, Secur. Commun. Networks.
[19] Fagen Li,et al. ID-based Signcryption Scheme with (t, n) Shared Unsigncryption , 2006, Int. J. Netw. Secur..
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[22] Wenbo Mao,et al. Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.
[23] Yi Mu,et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[24] Jin Li,et al. Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..