共 15 条
- [1] Even S., Goldreich O., Macali S., On-line/off-line digital signatures, Proceedings of Advances in Cryptology: Crypto'89, pp. 263-275, (1990)
- [2] Crutchfield C., Molnar D., Turner D., Generic on-line/off-line threshold signatures, Proceedings of Public Key Cryptography, pp. 58-74, (2006)
- [3] Shamir A., Tauman Y., Improved online/offline signature schemes, Proceedings of Advances in Cryptology, pp. 355-367, (2001)
- [4] Xu S., Mu Y., Susilo W., Et al., Online/offline signatures and multisignatures for AVOD and DSR routing security, ACISP '06, pp. 99-110, (2006)
- [5] Joseph K.L., Baek J., Zhou J., Et al., Efficient online/offline identity-based signature for wireless sensor network, International Journal of Information Security, 9, 4, pp. 287-296, (2010)
- [6] Yao A.C.-C., Zhao Y., Online/offline signatures for low-power devices, IEEE Transactions on Information Forensics and Security, 8, 2, pp. 283-294, (2013)
- [7] Hohenberger S., Waters B., Online/offline attribute-based encryption, PKC '14, pp. 293-310, (2014)
- [8] Gentry C., Peikert C., Vaikuntanathan V., How to use a short basis: trapdoors for hard lattices and new cryptographic constructions, STOC 2008, pp. 197-206, (2008)
- [9] Cash D., Hofheinz D., Kiltz E., Et al., Bonsai trees, or how to delegate a lattice basis, Journal of Cryptology, 25, 4, pp. 601-639, (2012)
- [10] Agrawal S., Boneh D., Boyen X., Lattice basis delegation in fixed dimension and shorter ciphertext hierarchical IBE, Crypto 2010, pp. 98-115, (2010)