共 50 条
- [21] Proxy Re-Encryption and Re-Signatures from Lattices APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 363 - 382
- [22] Practical "Signatures with Efficient Protocols" from Simple Assumptions ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 511 - 522
- [23] Efficient error bit identification from failing signatures NINTH ANNUAL IEEE INTERNATIONAL ASIC CONFERENCE AND EXHIBIT, PROCEEDINGS, 1996, : 259 - 262
- [24] Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm PROVABLE SECURITY, 2010, 6402 : 87 - 101
- [26] Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, : 27 - 32
- [27] Efficient blind signatures from linear feedback shift register COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, 2007, 4674 : 423 - +
- [28] Efficient Fail-Stop Signatures from the Factoring Assumption INFORMATION SECURITY, 2011, 7001 : 372 - 385