Author:
Fleischhacker Nils,Krupp Johannes,Malavolta Giulio,Schneider Jonas,Schröder Dominique,Simkin Mark
Publisher
Springer Berlin Heidelberg
Reference42 articles.
1. Lecture Notes in Computer Science;G Ateniese,2005
2. Lecture Notes in Computer Science;N Attrapadung,2013
3. Lecture Notes in Computer Science;M Bellare,2014
4. Lecture Notes in Computer Science;M Bellare,2003
5. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. Cryptology ePrint Archive, Report 2003/096 (2003). http://eprint.iacr.org/2003/096
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient post-quantum secure deterministic wallet scheme;Cybersecurity;2024-08-03
2. Byzantine Fault-Tolerant Aggregate Signatures;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
4. An Improved Updatable Signature Scheme with Weakened Token;Communications in Computer and Information Science;2024
5. Construction of a Sanitizable Signature and Its Application in Blockchain;Communications in Computer and Information Science;2024