Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings
暂无分享,去创建一个
Lin You | Gengran Hu | Xiwei Shan | Gengran Hu | Lin You | Xiwei Shan
[1] Fuchun Guo,et al. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2014, IEEE Transactions on Information Forensics and Security.
[2] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[3] Chun Ying,et al. F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms , 2019, Secur. Commun. Networks.
[4] Wenfen Liu,et al. Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..
[5] P. Vasudeva Reddy,et al. Pairing Free Identity-Based Blind Signature Scheme with Message Recovery , 2017, Cryptogr..
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Muhammad Khurram Khan,et al. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor , 2016, Secur. Commun. Networks.
[9] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[10] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[11] Zhiguang Qin,et al. Analysis and improvement of a provable secure fuzzy identity-based signature scheme , 2014, Science China Information Sciences.
[12] Neyire Deniz Sarier. A New Biometric Identity Based Encryption Scheme , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[13] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[14] Changji Wang. An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[15] Kefei Chen,et al. Fuzzy certificateless signature , 2016, Secur. Commun. Networks.
[16] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[17] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[18] Changji Wang. A provable secure fuzzy identity based signature scheme , 2011, Science China Information Sciences.
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] Xiaolei Dong,et al. Fuzzy Identity Based Signature , 2008, IACR Cryptol. ePrint Arch..
[21] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[22] Neyire Deniz Sarier. Efficient biometric-based Encryption for fingerprints , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[23] Yupu Hu,et al. An Efficient Biometric Identity Based Signature Scheme , 2013, KSII Trans. Internet Inf. Syst..
[24] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.