-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Proc. Asiacrypt 2003
-
S. Al-Riyami and K. Paterson, Certificateless public key cryptography, in: Proc. Asiacrypt 2003, LNCS 2894 (2003), pp. 452-473.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Proc. CRYPTO 2002
-
P. Barreto, H. Kim, B. Lynn, and M. Scott, Efficient algorithms for pairing-based cryptosystems, in: Proc. CRYPTO 2002, LNCS 2442 (2002), pp. 354-368.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
3
-
-
84946840347
-
Short signatures from the weil pairings
-
Proc. Asiacrypt 2001
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairings, in: Proc. Asiacrypt 2001, LNCS 2248 (2001), pp. 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
33846938928
-
An identity-based signature from Gap Diffie-Hellman groups
-
eprint.iacr.org/2002/018
-
J. Cha and J. Cheon, An identity-based signature from Gap Diffie-Hellman groups. Cryptology ePrint Archive: Report 2002/018. eprint.iacr.org/2002/018/.
-
Cryptology ePrint Archive: Report
, vol.2002
, Issue.18
-
-
Cha, J.1
Cheon, J.2
-
5
-
-
82955246861
-
Implementing the Tate pairing
-
Proc. of Algorithmic Number Theory 5th International Symposium, ANTS-V
-
S. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, in: Proc. of Algorithmic Number Theory 5th International Symposium, ANTS-V, LNCS 2369 (2002), pp. 324-337.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
6
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Proc. of 9th Workshop on Selected Areas in Cryptography, SAC2002, Springer
-
F. Hess, Efficient identity based signature schemes based on pairings, in: Proc. of 9th Workshop on Selected Areas in Cryptography, SAC2002, LNCS 2595, Springer (2003), pp. 310-324.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
7
-
-
0010567510
-
Proxy signatures, revisited
-
Proc. ICICS97, International Conference on Information and Communications Security
-
S. Kim, S. Park, and D. Won, Proxy signatures, revisited, in: Proc. ICICS97, International Conference on Information and Communications Security, LNCS 1334 (1997), pp. 223-232.
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
8
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim, and K. Kim, Strong proxy signature and its applications, in: Proc. of SCIS 2001 (2001), pp. 603-608.
-
(2001)
Proc. of SCIS 2001
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
9
-
-
18244389623
-
An authenticated certificateless public key encryption scheme
-
eprint.iacr.org/2004/150
-
Y. Lee and H. Lee, An authenticated certificateless public key encryption scheme, Cryptology ePrint Archive: Report 2004/150. Available at: eprint.iacr.org/2004/150/.
-
Cryptology ePrint Archive: Report
, vol.2004
, Issue.150
-
-
Lee, Y.1
Lee, H.2
-
10
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signature: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A:9, 1338-1353 (1996).
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
11
-
-
0029717329
-
Proxy signature for delegating signing opertion
-
ACM Press, New York
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signature for delegating signing opertion, in: Proc. of 3rd ACM Conference on Computer and Communications Security, ACM Press, New York (1996), pp. 48-57.
-
(1996)
Proc. of 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
12
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
Proc. of PKC 2001
-
T. Okamoto and D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proc. of PKC 2001, LNCS 1992 (2001), pp. 104-118.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
13
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
38487, January
-
K. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, 38487, 1025-1020, January (1999).
-
(1999)
Electronics Letters
, pp. 1025-11020
-
-
Paterson, K.1
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO'84 Springer
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Advances in Cryptology - CRYPTO'84 LNCS 196, Springer (1984), pp. 47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
35048832495
-
Generic construction of certificateless signature
-
Proc. ACISP 2004
-
D. Yum and P. Lee, Generic construction of certificateless signature, in: Proc. ACISP 2004, LNCS 3108 (2004), pp. 200-211.
-
(2004)
LNCS
, vol.3108
, pp. 200-211
-
-
Yum, D.1
Lee, P.2
-
16
-
-
21144446236
-
New proxy signature, proxy blind signature, proxy ring signature schemes from bilinear pairings
-
F. Zhang, R. Safavi-Naini, and C. Lin, New proxy signature, proxy blind signature, proxy ring signature schemes from bilinear pairings, Cryptology ePrint Archive: Report 2003/104: http://eprint.iacr.org/2003/104/.
-
Cryptology ePrint Archive: Report
, vol.2003
, Issue.104
-
-
Zhang, F.1
Safavi-Naini, R.2
Lin, C.3
|