|
[1] Nazar Abbas Saqib Çetin Kaya Koç Francisco Rodríguez-Henríquez, Arturo Díaz Pérez. Cryptographic Algorithms on Reconfigurable Hardware. Springer US, 2007 . [2] Thomas Schack Achim Schneider Frank Seliger Uwe Hansmann, Martin S. Nicklous. Smart Card Application Development Using Java. Springer-Verlag Berlin Heidelberg, 2002 . [3] Mahima Ranjan Adhikari Avishek Adhikari. Basic Modern and Algebra with and Applications. Springer India, 2014 . [4] Adi Shamir. Identity-based cryptosystems and signature scheme. In G.R. Blakley and D. Chaum, editors, LECT NOTES COMPUT SC, volume 196, pages 47–53, 1985 . [5] Dae Hyun Yum and Pil Joong Lee. Identity-based cryptography in public key management. In S.K. Katsikas et al., editors, EuroPKI, volume 3093, pages 71–84, 2004 . [6] Qianhong Wu Bo Qin Weiran Liu, Xiao Liu. Experimental performance comparisons between (h)ibe schemes over composite-order and prime-order bilinear groups. In IBCAST, pages 203–209, 2014 . [7] Sattam S. Al-Riyami and Kenneth G. Paterson. Certificateless public key cryptography. In AsiaCrypt, pages 452–473, 2003 . [8] Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang. On the security of certificateless signature schemes from asiacrypt 2003. In Y.G. Desmedt et al., editors, CANS, volume 3810, pages 13–25, 2005 . [9] Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, and Wei Wu. Certificateless signature revisited. In J. Pieprzyk, H. Ghodosi, and E. Dawson, editors, ACISP, volume 4586, pages 308–322, 2007 . [10] Yang Lu, Quanling Zhang, and Jiguo Li. An improved certificateless strong key-insulated signature scheme in the standard model. In AIMS, volume 9, pages 353–373, 2015 . [11] Willy Susilo Joseph K. Liu, Man Ho Au. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In ASIACCS, pages 273–283, 2003 . [12] Wun-She Yap, Swee-Huay Heng, and Bok-Min Goi. An efficient certificateless signature scheme. In EUC, pages 322–331, 2006 . [13] Zhenfeng Zhang, Duncan S. Wong, Jing Xu, and Dengguo Feng. Certificateless public-key signature: Security model and efficientcient construction. In J. Zhou, M. Yung, and F. Bao, editors, ACNS, volume 3989, pages 293–308, 2006 . [14] L. Zhang and F. Zhang. A new provably secure certificateless signature scheme. In ICC, pages 1685–1689, 2008 . [15] Lei Zhang, Futai Zhang, and Fangguo Zhang. New efficient certificateless signature scheme. In M. Denko et al., editors, EUC Workshops, volume 4809, pages 692–703, 2007 . [16] Hongzhen Du and Qiaoyan Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. In COMPUT STAND INTER, pages 390–394, 2009 . [17] Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, and Dong Hoon Lee. Efficientcient certificateless signature schemes. In J. Katz and M. Yung, editors, ACNS, volume 4521, pages 443–458, 2007 . [18] Willy Susilo Wei Wu, Yi Mu and Xinyi Huang. Certificate-based signatures: New definitions and a generic construction from certificateless signatures. In K.-I. Chung, K. Sohn, and M. Yung, editors, WISA, volume 5379, pages 99–114, 2009 . [19] Kyu Young Choi, Jong Hwan Park, and Dong Hoon Lee. A new provably secure certificateless short signature scheme. In COMPUT MATH APPL, volume 61, pages 1760–1768, 2011 . [20] Raylin Tso, Xun Yi, and Xinyi Huang. Efficient and short certificateless signature. In M.K. Franklin, L.C.K. Hui, and D.S. Wong, editors, CANS, volume 5339, pages 64–79, 2008 . [21] Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the weil pairing. In AsiaCrypt, pages 514–532, 2001 . [22] Kuo-Hui Yeh, Kuo-Yu Tsai, and Chuan-Yen Fan. An efficient certificateless signature scheme without bilinear pairings. In MULTIMED TOOLS APPL, volume 74, pages 6519–6530, 2014 . [23] Kumar Sharad. Certificateless Encryption Scheme Using Biometric Identity. Master’s Thesis, 2012 . [24] Benjamin Lynn. Pairing-based cryptography library. url http:// crypto.stanford.edu/pbc/. 2007 . [25] Angelo De Caro. jpbc: Java pairing based cryptography. In ISCC, pages 850– 855, 2011. |