Author:
Tan Syh-Yuan,Heng Swee-Huay
Reference9 articles.
1. An efficient identity-based signature scheme with provable security;P Yi;Information Sciences,2021
2. Efficient identity-based signatures secure in the standard model;K G Paterson;Information Security and Privacy,2006
3. Puncturable signature: A generic construction and instantiations;M Jiang;Computer Security -ESORICS 2022,2022
4. Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles;M Bellare;Public Key Cryptography -PKC 2007,2007
5. Proofs of partial knowledge and simplified design of witness hiding protocols;R Cramer;Advances in Cryptology -CRYPTO '94,1994