Identity-Based Signature Schemes
Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes
8
A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET
9
Galindo-Garcia Identity-Based Signature, Revisited
27
Improved on Identity-based quantum signature based on Bell states
6
Security Analysis of Two Lightweight Certificateless Signature Schemes
7
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
30
Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme
13
An Identity-Based Mediated Signature Scheme Without Trusted PKG
8
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
9
A New Approach to Group Signature Schemes
6
Provably Secure Certificate-based Proxy Signature Schemes
9
A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
9
AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
7
Design of Identity-Based Blind Signature Scheme Upon Chaotic Maps
15
A Fair Electronic Cash System with Identity Based Group Signature Scheme
7
Secure and efficient identity-based proxy signature scheme with message recovery
26
A Pairing Free Secure Identity-based Aggregate Signature Scheme Under Random Oracle
8
Tighter Reductions for Forward-Secure Signature Schemes
20
On The Security of One-Witness Blind Signature Schemes
25
Attacking Deterministic Signature Schemes using Fault Attacks
21