Journal of Guangdong University of Technology ›› 2007, Vol. 24 ›› Issue (4): 63-66.
• Comprehensive Studies • Previous Articles Next Articles
[1] Shimon Even,Oded Goldreich,Silvio Micali.On-line/off-linedigital signatures. Proc CRYPTO89 . 1990[2] Adi Shamir,Yael Tauman.Improved online/offine signatureschemes. Advances in Cryptology——CRYPTO’2001In-ternational Association for Cryptologic Research . 2001[3] Hugo Krawczyk,and Tal Rabin.Chameleon signatures. Pro-ceedings ofthe Symposium on Network and Distributed Sys-tems Security(NDSS’00) . 2000[4] GAO Chong-zhi,,YAO Zheng-an.How to Authenticate RealTime Streams Using Improved Online/Offline Signatures. Lecture Notes in Computer Science . 2005[5] Mihir Bellare,Phillip Rogaway.Random oracles are practi-cal:Aparadigm for designing efficient protocols. Pro-ceedings ofthe1st ACM Conference on Computer and Com-munications Security . 1993[6] Dan Boneh,,Xavier Boyen.Short signatures without randomoracles. Advances in Cryptology Eurocrypt2005 . 2004[7] Shaffi Goldwasser,Silvio Micali,Ron L Rivest.A digital sig-nature scheme secure against adaptive chosen-message at-tacks. SIAM Journal on Computing . 1988[8] Dan Boneh,Ben Lynn,Hovav Shacham.Short signaturesfrom the weil pairing. ASIACRYPT . 2001[9] Mitsunari,Sakai,Kasahara.Anewtraitor tracing. TIE-ICE:IEICE transactions on Communications/Electronics/Information and Systems . 2002[10] Jan Camenisch,Anna Lysyanskaya.Signature schemes andanonymous credentials from bilinear maps. CRYPTO . 2004[11] Anna Lysyanskaya,,Ronald L,Rivest,et al.Pseudonym sys-tems. Selected Areas in Cryptography . 1999 |
No related articles found! |
|