Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency

被引:11
|
作者
机构
[1] Wang, Yuyu
[2] Tanaka, Keisuke
来源
Wang, Yuyu | 1600年 / Springer Verlag卷 / 8782期
关键词
Compendex;
D O I
10.1007/978-3-319-12475-9_9
中图分类号
学科分类号
摘要
Hash functions
引用
收藏
相关论文
共 50 条
  • [31] Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATICA, 2014, 25 (03) : 505 - 521
  • [32] Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
    Yang, Wenjie
    Weng, Jian
    Luo, Weiqi
    Yang, Anjia
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [33] Signature Schemes with Bounded Leakage Resilience
    Katz, Jonathan
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 703 - +
  • [34] Transformation of digital signature schemes into designated confirmer signature schemes
    Goldwasser, S
    Waisbard, E
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 77 - 100
  • [35] Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model
    Pang, Liaojun
    Zhao, Huiyang
    Zhou, Xia
    Li, Huixian
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [36] A CDH-based strongly unforgeable signature without collision resistant hash function
    Matsuda, Takahiro
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 68 - +
  • [37] A strongly unforgeable signature under the CDH assumption without collision resistant hash functions
    Matsuda, Takahiro
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05): : 1466 - 1476
  • [38] Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Li, Fagen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 69 - 77
  • [39] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [40] An identity-based strongly unforgeable signature without random oracles from bilinear pairings
    Kwon, Saeran
    [J]. INFORMATION SCIENCES, 2014, 276 : 1 - 9