Universal Encrypted Deniable Authentication Protocol
暂无分享,去创建一个
[1] Zhenfu Cao,et al. Efficient non-interactive deniable authentication protocols , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[2] Yonatan Aumann,et al. Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.
[3] Zuhua Shao. Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.
[4] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[5] Chris Xu,et al. Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .
[6] Zhenfu Cao,et al. A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[9] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[10] David Pointcheval,et al. REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.
[11] Zhenfu Cao,et al. An improved deniable authentication protocol , 2006, Networks.
[12] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[13] Dongdai Lin,et al. An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[14] Duncan S. Wong,et al. Cryptanalysis of a suite of deniable authentication protocols , 2006, IEEE Communications Letters.
[15] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[16] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[17] Xiaolei Dong,et al. Group Oriented Deniable Authentication Protocol , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Xu Chongxiang. Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .
[20] Jianhua Li,et al. Identity-based deniable authentication protocol , 2005 .
[21] Zhenfu Cao,et al. A New ID-Based Deniable Authentication Protocol , 2007, Informatica.
[22] Zhenfu Cao,et al. Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.
[23] Jianhua Li,et al. A simple protocol for deniable authentication based on ElGamal cryptography , 2005, Networks.
[24] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[25] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[26] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[27] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[30] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[31] Ed Dawson,et al. A Public Key Cryptosystem Based on the Subgroup Membership Problem , 2001, ICICS.
[32] Ed Dawson,et al. A Public Key Cryptosystem Based On A Subgroup Membership Problem , 2005, Des. Codes Cryptogr..