RKA Security for Identity-Based Signature Scheme
暂无分享,去创建一个
[1] Hui Ma,et al. RKA Security of Identity-Based Homomorphic Signature Scheme , 2019, IEEE Access.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] David Cash,et al. Cryptography Secure Against Related-Key Attacks and Tampering , 2011, IACR Cryptol. ePrint Arch..
[4] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[5] Yi Mu,et al. Proof of retrievability with public verifiability resilient against related-key attacks , 2015, IET Inf. Secur..
[6] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[7] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[8] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[9] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[10] Jinyong Chang,et al. Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model , 2016, ICISC.
[11] Lin Ding,et al. Related Key Chosen IV Attack on Grain-128a Stream Cipher , 2013, IEEE Transactions on Information Forensics and Security.
[12] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[13] Rishiraj Bhattacharyya,et al. Secure Message Authentication Against Related-Key Attack , 2013, FSE.
[14] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.
[15] Jinyong Chang,et al. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..
[16] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[17] Billy Bob Brumley. Efficient Three-Term Simultaneous Elliptic Scalar Multiplication with Applications ? , 2006 .
[18] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.