|
[1] A. Shamir., “Identity-based cryptosystems and signature schemes”, in Proc. of CRYPTO 1984, Springer-Verlag, LNCS 196, pp.47-53, 1984. [2] A. Menezes, T. Okamoto and S. Vanstone., “Reducing elliptic curve logarithms to logarithms in a finite field”, IEEE Tran. on Info. TH., Vol. 39, pp. 1639-1646, 1993. [3] A. Joux, K. Nguyen, “Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups” ,available from eprint.iacr.org, Jan. 2001. [4] B. G. Kang, J. H. Park, and S. G. Hahn., “A Certificate-Based Signature Scheme”, CT-RSA 2004, Springer-Verlag, LNCS 2964, pp. 99-111, 2004. [5] B. Libert, J.J. Quisquater. “Efficient revocation and threshold pairing based cryptosystems.” Symposium on Principles of Distributed Computing-PODC'2003, pp.163-171, 2003. [6] C. Gentry., “Certificate-Based Encryption and the Certificate Revocation Problem”, in Proc. of Eurocrypt 2003, Springer-Verlag, LNCS 2656, pp.272-293, 2003. [7] D. Boneh, X. Ding, G. Tsudik, and C. Wong. “A method for fast revocation of public key certificates and security capabilities.” In proceedings of the 10-th USENIX Security Symposium, USENIX, 2001. [8] D. Boneh, C. Gentry, B.Lynn and H.Shacham. “Aggregate and verifiably encrypted signatures from bilinear maps.” In Proc. of Eurocrypt 2003, Springer-Verlag, LNCS 2656, pp. 416-432, 2003. [9] D. Chaum, “Blind signatures for untraceable payments”, Advances in Cryptology, Crypto’82, Plenum Press, pp. 199-203, 1983. [10] D. Boneh, M Franklin. “Efficient generation of shared RSA keys.”, In Proc. of Crypto'97, Springer-Verlag, LNCS 1233, pp. 425-439, 1997. [11] D. Boneh and M. Franklin., “Identity-Based Encryption from the Weil pairing”, in Proc. of CRYPTO 2001, Springer-Verlag, LNCS 2139, pp.213-229, 2001. [12] D. Boneh, X. Ding, and G. Tsudik. “Identity based encryption using mediated RSA.” In proceedings of the 3rd Workshop on Information Security Application, 2002. [13] D. Boneg, “The decision Diffie-Hellman problem”, in Proc. Third Algorithmic Number Theory Symposium, Springer-Verlag, LNCS 1423, pp. 48-63, 1998. [14] F. Hess, “Efficient Identity Based Signature Schemes Based on Pairings, ” Selected Areas in Cryptography -- SAC'2002, Springer-Verlag, LNCS 2595, pp. 310—324, 2003. [15] J. C. Cha and J. H. Cheon “An identity-based signature from Gap Diffie-Hellman Groups” PKC 2003, Springer-Verlag, LNCS 2567, pp.18-30, 2003. [16] NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan 1977. [17] NIST FIPS PUB 180-1, “Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr 1995. [18] N. Gilboa, “Two Party RSA Key Generation.” In Proc. of Crypto'99, Springer-Verlag, LNCS 1666, pp. 249-263, 1999. [19] National Institute of Standards and Technology, “The Advanced Encryption Standard”, http://csrc.nist.gov/aes/, 2000. [20] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, V.21, n.2, pp.120-126, Feb 1978. [21] R.L. Rivest, A. Shamir and Y. Tauman, “How to leak a secret”, Advances in Cryptology-Asiacrypt 2001, Spring-Verlag, LNCS 2248, pp. 552-565, 2001. [22] R. Rivest, “The MD5 Message Digest Algorithm”, RFC 1321, Apr 1992 [23] S. S. Al-Riyami, K. G. Paterson, “Certificateless Public Key Cryptography”, Advances in Cryptology -- Asiacrypt'2003, Springer-Verlag, LNCS 2894, pp. 452-473, 2003. [24] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, Advances in Cryptology-CRYPTO'84, Springer-Verlag, LNCS 196, pp.10-18, 1985 [25] W. Diffie and M. E. Hellman, “New Directions in Cryptography.” IEEE Transactions on Information Theory, Vol. IT-22, No.6, pp.644-654, Nov. 1976. [26] X. Yi, “An identity-based signature scheme from the Weil pairing” IEEE Communications Letters, Vol. 7, No. 2, February 2003. [27] X. Lai, J. Massey, “A Proposal for a New Block Encryption Standard”, Advances in Cryptology-EUROCRYPT'90, Springer-Verlag, LNCS 473, pp.389-404, 1991. [28] X. Yi, “Efficient ID-based key agreement from Weil pairing”, Electronics Letters , Volume: 39 , Issue: 2, pp. 206 – 208, Jan. 2003. [29] Y. Dodis, J. Katz, S. Xu, and M. Yung. “Key-Insulated Public Key Cryptosystems.”, In Proc. of Eurocrypt 2002, Springer-Verlag, LNCS 2332, pp.65-82, 2002.
|