-
1
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signature: Delegation of the power to sign messages, In IEICE Trans. Fundamentals, 1996, Vol. E79-A, No.9, Sep., pp. 1338-1353.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9 SEP.
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
New Dehli, India, ACM Press New York
-
M. Mambo, K. Usuda, E. Okamoto, Proxy signatures for delegating signing operation, Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India, ACM Press New York, 1996, pp. 48-57.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
3
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, Sep.
-
K. Zhang. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, Sep. 1997, pp. 191-197.
-
(1997)
1997 Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
-
6
-
-
10844257031
-
On Zhang's non-repudiable proxy signature schemes
-
Springer-Verlag, Lecture Notes in Computer Science 1438
-
N. Y. Lee, T. Hwang, C. H. Wang. On Zhang's non-repudiable proxy signature schemes. ACISP'98, Springer-Verlag, 1998,Lecture Notes in Computer Science 1438, pp. 241-257.
-
(1998)
ACISP'98
, pp. 241-257
-
-
Lee, N.Y.1
Hwang, T.2
Wang, C.H.3
-
7
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag, LNCS 2248
-
R.L. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, Advances in Cryptology -Asiacrypt 2001, Springer-Verlag, 2001, LNCS 2248, pp. 552-565.
-
(2001)
Advances in Cryptology -asiacrypt 2001
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
8
-
-
4544352978
-
A new fair micropayment system based on hash chain
-
Soe-Tsyr Yuan, Jiming Liu eds. Los Alamitos, California: IEEE Computer Society
-
Zongkai Yang, Weimin Lang, YunMeng tan. A New Fair Micropayment System Based on Hash Chain. In: Soe-Tsyr Yuan, Jiming Liu eds. Proceedings of IEEE International Conference on eTechnology, eCommerce, and eService (EEE'04), Los Alamitos, California: IEEE Computer Society, 2004. pp. 139-145
-
(2004)
Proceedings of IEEE International Conference on eTechnology, eCommerce, and eService (EEE'04)
, pp. 139-145
-
-
Yang, Z.1
Lang, W.2
Tan, Y.3
-
9
-
-
82955246861
-
Implementing the Tate pairing
-
LNCS 2369, Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, Algorithmic Number Theory Symposium-ANTS-V, LNCS 2369, Springer-Verlag 2002, pp. 324-337.
-
(2002)
Algorithmic Number Theory Symposium-ANTS-V
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
10
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag, LNCS 196
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, Springer-Verlag, 1984, LNCS 196, pp. 47-53.
-
(1984)
Advances in Cryptology-crypto 84
, pp. 47-53
-
-
Shamir, A.1
-
11
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer-Verlag, LNCS 2139
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, Springer-Verlag, 2001, LNCS 2139, pp. 213-229.
-
(2001)
Advances in Cryptology-crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
LNCS 2442, Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, Efficient Algorithms for Pairing-based Cryptosystems, Advances in Cryptology-Crypto 2002, LNCS 2442, Springer-Verlag 2002, pp. 354-368.
-
(2002)
Advances in Cryptology-crypto 2002
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
13
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd, editor, Springer-Verlag, LNCS 2248
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, Springer-Verlag, 2001, LNCS 2248, pp. 514-532.
-
(2001)
Advances in Cryptology-asiacrypt 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
0842304790
-
Efficient threshold signature, multisignature and blind signature schemes based on the Gap Diffie-Hellman group signature scheme
-
Springer-Verlag, LNCS 2139
-
A. Boldyreva, Efficient threshold signature, multisignature and blind signature schemes based on the Gap Diffie-Hellman group signature scheme, Public Key Cryptography - PKC 2003, Springer-Verlag, 2003, LNCS 2139, pp. 31-46.
-
(2003)
Public Key Cryptography - PKC 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
15
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Y. Zheng ed., Springer-Verlag, Lecture Notes in Computer Science vol. 2501
-
F. Zhang, K. Kim, ID-Based Blind Signature and Ring Signature from Pairings. In: Y. Zheng ed., Advances in Cryptology-Asiacrypt'02, Springer-Verlag, 2002, Lecture Notes in Computer Science vol. 2501.
-
(2002)
Advances in Cryptology-asiacrypt'02
-
-
Zhang, F.1
Kim, K.2
-
16
-
-
3042557742
-
Efficient ID-based blind signature and proxy signature from pairings
-
to appear, Springer-Verlag
-
F. Zhang and K. Kim, Efficient ID-based blind signature and proxy signature from pairings, to appear at ACISP 2003, Springer-Verlag, 2003.
-
(2003)
ACISP 2003
-
-
Zhang, F.1
Kim, K.2
-
17
-
-
21144446236
-
-
Cryptology ePrint Archive, Report 2003/104
-
Fangguo Zhang, Reihaneh Safavi-Naini and Chih-Yin Lin, New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings, Cryptology ePrint Archive, Report 2003/104.
-
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
-
-
Zhang, F.1
Safavi-Naini, R.2
Lin, C.-Y.3
|