Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
暂无分享,去创建一个
Jiguo Li | Yichen Zhang | Haiting Du | Jiguo Li | Yichen Zhang | H. Du
[1] Yi Mu,et al. Constructions of certificate-based signature secure against key replacement attacks , 2010, J. Comput. Secur..
[2] Yi Mu,et al. Certificate-based Signatures Revisited , 2009, J. Univers. Comput. Sci..
[3] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[4] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[5] Lizhong Xu,et al. An efficient short certificate-based signature scheme , 2012, J. Syst. Softw..
[6] R. Nicoll,et al. Invited lecture , 1997, Neuroscience Research.
[7] Rufen Huang,et al. Provably Secure Certificate-based Signature Scheme Without Pairings , 2013 .
[8] Youngho Park,et al. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET , 2009, MOBILIGHT.
[9] M Yegani,et al. Online professional networking: an effective interactive tool. , 2009, Poultry science.
[10] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[11] Kenneth G. Paterson,et al. Challenges for Trusted Computing , 2008, IEEE Security & Privacy Magazine.
[12] Jian Weng,et al. Identity-Based Threshold Key-Insulated Encryption without Random Oracles , 2008, CT-RSA.
[13] Joonsang Baek,et al. Certificate-Based Signature Schemes without Pairings or Random Oracles , 2008, ISC.
[14] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[15] Xinyi Huang,et al. Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..
[16] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[17] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[18] Yuan Zhou,et al. Identity Based Key Insulated Signature , 2006, ISPEC.
[19] Yi Mu,et al. Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.
[20] Tao Li,et al. Certificate-Based Key-Insulated Signature , 2012, ICDKE.
[21] Jian Weng,et al. Identity-Based Key-Insulated Signature with Secure Key-Updates , 2006, Inscrypt.
[22] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[23] Jian Weng,et al. Certificateless key-insulated signature without random oracles , 2009 .
[24] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[25] Hideki Imai,et al. Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.
[26] Anna Lysyanskaya,et al. Unique Signatures and Verifiable Random Functions from the DH-DDH Separation , 2002, CRYPTO.
[27] Jiguo Li,et al. Parallel key-insulated signature scheme without random oracles , 2013, Journal of Communications and Networks.
[28] Jinhui Zhang,et al. Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme , 2012 .
[29] Goichiro Hanaoka,et al. An Efficient Strong Key-Insulated Signature Scheme and Its Application , 2008, EuroPKI.
[30] Jiguo Li,et al. A Forward-Secure Certificate-Based Signature Scheme in the Standard Model , 2012, CSS.
[31] Jian Weng,et al. Identity-Based Parallel Key-Insulated Signature Without Random Oracles , 2008, J. Inf. Sci. Eng..
[32] Je Hong Park,et al. A Certificate-Based Signature Scheme , 2004, CT-RSA.
[33] Jin Li,et al. A Strong Identity Based Key-Insulated Cryptosystem , 2006, EUC Workshops.