On provably secure code-based multiple grade proxy signature scheme
暂无分享,去创建一个
Yan Ren | Hongbin Wang | Yunhong Hu | Hongbing Wang | Yan Ren | Yunhong Hu
[1] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[2] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[3] Andrew S. Tanenbaum,et al. Disallowing Unauthorized State Changes of Distributed Shared Objects , 2000, SEC.
[4] Matthieu Finiasz,et al. How to Achieve a McEliece-Based Digital Signature Scheme , 2001, ASIACRYPT.
[5] Yi Mu,et al. An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.
[6] Tsz Hon Yuen,et al. Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Andrew S. Tanenbaum,et al. A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.
[9] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[10] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[11] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[12] Pierre-Louis Cayrel,et al. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2008, IEEE Transactions on Information Theory.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Ru Peng. A Multiple Grade Proxy Signature Scheme Based on Strong Key-insulated Scheme , 2007 .
[15] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[16] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[17] Ed Dawson,et al. A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..
[18] Fagen Li,et al. A Certificateless Proxy Ring Signature Scheme with Provable Security , 2011, Int. J. Netw. Secur..
[19] Abolfazl Falahati,et al. A Proxy Signature Scheme Based on Coding Theory , 2010, ICGS3.
[20] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[21] XU Qiu-liang. A new efficient hierarchy of proxy authorization , 2008 .
[22] Ammar Bouallegue,et al. Secure and Fast Digital Signatures using BCH Codes , 2006 .
[23] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[24] Ed Dawson,et al. Identity-based strong designated verifier signature schemes: Attacks and new construction , 2009, Comput. Electr. Eng..
[25] Zhenfu Cao,et al. A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..
[26] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .
[27] Zhenfu Cao,et al. A secure identity-based proxy multi-signature scheme , 2009, Inf. Sci..