暂无分享,去创建一个
Wei Wu | Futai Zhang | Lei Zhang | Wei Wu | Futai Zhang | Lei Zhang
[1] Bok-Min Goi,et al. Cryptanalysis of Some Proxy Signature Schemes Without Certificates , 2007, WISTP.
[2] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[3] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[4] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[5] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[6] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[7] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[8] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[9] Gwoboa Horng,et al. Public Key Authentication Schemes for Local Area Networks , 2008, Informatica.
[10] Colin Boyd,et al. Security-Mediated Certificateless Cryptography , 2006, Public Key Cryptography.
[11] Germán Sáez,et al. New Identity-Based Ring Signature Schemes , 2004, ICICS.
[12] Wenyin Liu,et al. Advances in Web-Based Learning – ICWL 2004 , 2004, Lecture Notes in Computer Science.
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[15] Kenneth G. Paterson,et al. An Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[16] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[17] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[18] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[19] Joseph K. Liu,et al. On the Security Models of (Threshold) Ring Signature Schemes , 2004, ICISC.
[20] Aggelos Kiayias,et al. Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.
[21] Yuh-Min Tseng,et al. A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards , 2008, Informatica.
[22] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[23] Joseph K. Liu,et al. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST , 2003, ICICS.
[24] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[25] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[26] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[27] Rongbo Lu,et al. Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[28] Bok-Min Goi,et al. An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..
[29] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[30] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[31] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[32] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[33] Sherman S. M. Chow,et al. Certificateless Ring Signatures , 2007, IACR Cryptol. ePrint Arch..
[34] Joonsang Baek,et al. Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .
[35] Xiangxue Li,et al. Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .
[36] Joseph K. Liu,et al. Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups , 2004, ESAS.
[37] Kyung-Ah Shim,et al. An Identity-Based Proxy Signature Scheme from Pairings , 2006, ICICS.
[38] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[39] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[40] Germán Sáez,et al. Forking Lemmas for Ring Signature Schemes , 2003, INDOCRYPT.
[41] Siu-Ming Yiu,et al. Identity Based Ring Signature: Why, How and What Next , 2005, EuroPKI.
[42] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[43] Ashutosh Saxena,et al. An Efficient Certificateless Signature Scheme , 2005, CIS.
[44] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[45] Basel Alomair,et al. Efficient Generic Forward-Secure Signatures and Proxy Signatures , 2008, EuroPKI.
[46] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[47] Tsz Hon Yuen,et al. Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.
[48] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[49] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[50] Duncan S. Wong,et al. Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification , 2007, EuroPKI.