Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
暂无分享,去创建一个
Jiahui Chen | Jianting Ning | Kaitai Liang | Emmanouil Panaousis | Jie Ling | Jiageng Chen | George Loukas | E. Panaousis | G. Loukas | K. Liang | Jiageng Chen | Jianting Ning | Jie Ling | Jiahui Chen
[1] Ludovic Perret,et al. GeMSS: A Great Multivariate Short Signature , 2017 .
[2] Shaohua Tang,et al. Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials , 2014, Future Gener. Comput. Syst..
[3] Ariel Shamir,et al. Cryptanalysis of the oil and vinegar signature scheme , 1998 .
[4] Albrecht Petzoldt,et al. MQSAS - A Multivariate Sequential Aggregate Signature Scheme , 2016, ISC.
[5] Stanislav Bulygin,et al. Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks , 2010, INDOCRYPT.
[6] Daojing He,et al. Online/offline signature based on UOV in wireless sensor networks , 2016, Wireless Networks.
[7] Nicolas Courtois. Generic Attacks and the Security of Quartz , 2003, Public Key Cryptography.
[8] Zuowen Tan,et al. Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme , 2009, J. Inf. Sci. Eng..
[9] Stanislav Bulygin,et al. CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key , 2010, INDOCRYPT.
[10] Taizo Shirai,et al. Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials , 2011, CRYPTO.
[11] Stanislav Bulygin,et al. Linear Recurring Sequences for the UOV Key Generation , 2011, Public Key Cryptography.
[12] Andrew S. Tanenbaum,et al. A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.
[13] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[14] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[15] Taizo Shirai,et al. On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack , 2011, PQCrypto.
[16] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[17] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[18] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[19] Stanislav Bulygin,et al. A multivariate based threshold ring signature scheme , 2013, Applicable Algebra in Engineering, Communication and Computing.
[20] Jintai Ding,et al. Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.
[21] Kenneth G. Paterson,et al. Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.
[22] Jean-Charles Faugère,et al. DualModeMS: A Dual Mode for Multivariate-based Signature , 2017 .
[23] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[24] Harendra Singh,et al. Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks , 2018, Ad Hoc Networks.
[25] Louis Goubin,et al. Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.
[26] Bart Preneel,et al. Field Lifting for Smaller UOV Public Keys , 2017, INDOCRYPT.
[27] Y. Peretz,et al. On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields , 2016, Finite Fields Their Appl..
[28] Peter Schwabe,et al. From 5-Pass MQ -Based Identification to MQ -Based Signatures , 2016, ASIACRYPT.
[29] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[30] Albrecht Petzoldt,et al. A Practical Multivariate Blind Signature Scheme , 2017, Financial Cryptography.
[31] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[32] Andrew S. Tanenbaum,et al. Disallowing Unauthorized State Changes of Distributed Shared Objects , 2000, SEC.
[33] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[34] Bo-Yin Yang,et al. Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.