Identity based identification from algebraic coding theory
暂无分享,去创建一个
[1] Pierre-Louis Cayrel,et al. Improved identity-based identification using correcting codes , 2009, ArXiv.
[2] Kazuo Ohta,et al. A Modification of the Fiat-Shamir Scheme , 1988, CRYPTO.
[3] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[4] Léonard Dallot. Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme , 2007, WEWoRC.
[5] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.
[6] P. Gaborit,et al. Identity-based identification and signature schemes using correcting codes , 2007 .
[7] Pierre-Louis Cayrel,et al. Identity-Based Identification and Signature Schemes using Error Correcting Codes , 2009, Identity-Based Cryptography.
[8] Matthieu Finiasz,et al. How to Achieve a McEliece-Based Digital Signature Scheme , 2001, ASIACRYPT.
[9] Kaoru Kurosawa,et al. Identity-Based Identification Without Random Oracles , 2005, ICCSA.
[10] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[11] Thomas Beth,et al. Efficient Zero-Knowledge Identification Scheme for Smart Cards , 1988, EUROCRYPT.
[12] Jacques Stern,et al. A new paradigm for public key identification , 1996, IEEE Trans. Inf. Theory.
[13] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[14] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[15] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[16] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[17] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[18] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[19] Kaoru Kurosawa,et al. From Digital Signature to ID-based Identification/Signature , 2004, Public Key Cryptography.
[20] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[21] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[22] Claus-Peter Schnorr,et al. Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.
[23] Xiaotie Deng,et al. A new framework for the design and analysis of identity-based identification schemes , 2008, Theor. Comput. Sci..
[24] Atsushi Fujioka,et al. Security Enhancements by OR-Proof in Identity-Based Identification , 2012, ACNS.