-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Springer
-
Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 415-432. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
26444521603
-
ID-based ring signature and proxy ring signature schemes from bilinear pairings
-
Amit K Awasthi and Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.184
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Springer-Verlag Heidelberg
-
Paulo S.L.M. Barreto, Hae Y. Kim, Ben Lynn, and Michael Scott. Efficient Algorithms for Pairing-Based Cryptosystems. In Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag Heidelberg, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. Springer-Verlag Heidelberg
-
Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag Heidelberg, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings. Springer
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Moti Yung, editor, Advances in Cryptology CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings. Springer
-
Emmanuel Bresson, Jacques Stern, and Michael Szydlo. Threshold Ring Signatures and Applications to Ad-hoc Groups. In Moti Yung, editor, Advances in Cryptology CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
8
-
-
23944497675
-
Blind spontaneous anonymous group signatures for ad hoc groups
-
1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August 5-6, 2004. Springer
-
Tony K. Chan, Karyin Fung, Joseph K. Liu, and Victor K. Wei. Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August 5-6, 2004, volume 3313 of Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3313
-
-
Chan, T.K.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
9
-
-
85024290278
-
Group signatures
-
Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Springer
-
David Chaum and Eugène van Heyst. Group Signatures. In Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
23944466280
-
Implementation of tate pairing of hyperelliptic curves of genus 2
-
Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
-
YoungJu Choie and Eunjeong Lee. Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 97-111. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2971
, pp. 97-111
-
-
Choie, Y.1
Lee, E.2
-
11
-
-
23944444766
-
Verifiable pairing and its applications
-
Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, Revised Papers. Springer-Verlag
-
Sherman S.M. Chow. Verifiable Pairing and Its Applications. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 173-187. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 173-187
-
-
Chow, S.S.M.1
-
12
-
-
24944505016
-
Impact of recent advances in cryptography on online game
-
Sherman S.M. Chow, H.W. Go, and Ricky W.M. Tang. Impact of Recent Advances in Cryptography on Online Game. In Third International Conference on Application and Development of Computer Games, Hong Kong, April 26-27, 2004, pages 68-73, 2004.
-
(2004)
Third International Conference on Application and Development of Computer Games, Hong Kong, April 26-27, 2004
, pp. 68-73
-
-
Chow, S.S.M.1
Go, H.W.2
Tang, R.W.M.3
-
13
-
-
24944492344
-
Identity based threshold ring signature
-
Sherman S.M. Chow, Lucas C.K. Hui, and S.M. Yiu. Identity Based Threshold Ring Signature. Cryptology ePrint Archive, Report 2004/179, 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.179
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
-
14
-
-
35048843296
-
Secure hierarchical identity based signature and its application
-
Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Springer-Verlag
-
Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow. Secure Hierarchical Identity Based Signature and its Application. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 480-494. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 480-494
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
15
-
-
24944516305
-
An e-lottery scheme using verifiable random function
-
Lecture Notes in Computer Science. Springer-Verlag. To Appear
-
Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow. An e-Lottery Scheme using Verifiable Random Function. In 3rd Workshop on Internet Communications Security (WICS 2005) of Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Lecture Notes in Computer Science. Springer-Verlag, 2005. To Appear.
-
(2005)
3rd Workshop on Internet Communications Security (WICS 2005) of Computational Science and its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
16
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
-
Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 352-369. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
17
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings. Springer
-
Ronald Cramer, Ivan Damgard, and Berry Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
18
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Springer
-
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, and Victor Shoup. Anonymous Identification in Ad Hoc Groups. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 609-626. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
19
-
-
82955246861
-
Implementing the tate pairing
-
Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings. Springer
-
Steven D. Galbraith, Keith Harrison, and David Soldera. Implementing the Tate Pairing. In Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, volume 2369 of Lecture Notes in Computer Science, pages 324-337. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
20
-
-
0242372952
-
A ring signature scheme based on the nyberg-rueppel signature scheme
-
Jianying Zhou, Moti Yung, and Yongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 Proceedings. Springer
-
Chong Zhi Gao, Zheng an Yao, and Lei Li. A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. In Jianying Zhou, Moti Yung, and Yongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 Proceedings, volume 2846 of Lecture Notes in Computer Science, pages 169-175. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2846
, pp. 169-175
-
-
Chong Zhi Gao1
Zheng An Yao2
Li, L.3
-
21
-
-
35048814061
-
Distributed ring signatures for identity-based scenarios
-
Javier Herranz and Germán Sáez. Distributed Ring Signatures for Identity-Based Scenarios. Cryptology ePrint Archive, Report 2004/190, 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.190
-
-
Herranz, J.1
Sáez, G.2
-
22
-
-
24944588207
-
New identity-based ring signature schemes
-
Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, Malaga, Spain, October. Springer-Verlag. Preliminary version available at Cryptology ePrint Archive, Report 2003/261
-
Javier Herranz and Germán Sáez. New Identity-Based Ring Signature Schemes. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 27-39, Malaga, Spain, October 2004. Springer-Verlag. Preliminary version available at Cryptology ePrint Archive, Report 2003/261.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 27-39
-
-
Herranz, J.1
Sáez, G.2
-
23
-
-
33745294595
-
An identity-based ring signature scheme from bilinear pairings
-
Chih-Yin Lin and Tzong-Chen Wu. An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/117, 2003. Available at http://eprint.iacr.org.
-
(2003)
Cryptology ePrint Archive, Report
, vol.2003
, Issue.117
-
-
Lin, C.-Y.1
Wu, T.-C.2
-
24
-
-
33645420820
-
A separable threshold ring signature scheme
-
Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
-
Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. A Separable Threshold Ring Signature Scheme. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 352-369. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2971
, pp. 352-369
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
25
-
-
24944558282
-
On the security models of (threshold) ring signature schemes
-
Lecture Notes in Computer Science, Seoul, Korea, December. Springer-Verlag
-
Joseph K. Liu and Duncan S. Wong. On the Security Models of (Threshold) Ring Signature Schemes. In Information Security and Cryptology - ICISC 2004, 7th International Conference Seoul, Korea, December 2-3, 2004, Revised Papers, Lecture Notes in Computer Science, Seoul, Korea, December 2004. Springer-Verlag.
-
(2004)
Information Security and Cryptology - ICISC 2004, 7th International Conference Seoul, Korea, December 2-3, 2004, Revised Papers
-
-
Liu, J.K.1
Wong, D.S.2
-
27
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
January
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 26(1):96-99, January 1983.
-
(1983)
Communications of the ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
28
-
-
84946833891
-
How to leak a secret
-
Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Springer
-
Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to Leak a Secret. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
30
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Springer-Verlag, 19-22 August
-
Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In G. R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 19-22 August 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
32
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Anne Canteaut and Kapalee Viswanathan, editors, Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings. Springer
-
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, and Duncan S. Wong. Separable Linkable Threshold Ring Signatures. In Anne Canteaut and Kapalee Viswanathan, editors, Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, volume 3348 of Lecture Notes in Computer Science, pages 384-398. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
33
-
-
33646021210
-
A bilinear spontaneous anonymous threshold signature for ad hoc groups
-
Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. Cryptology ePrint Archive, Report 2004/039, 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.39
-
-
Wei, V.K.1
-
34
-
-
0142218983
-
On the RS-code construction of ring signature schemes and a threshold setting of RST
-
Sihan Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Springer
-
Duncan S. Wong, Karyin Fung, Joseph K. Liu, and Victor K. Wei. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. In Sihan Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, volume 2836 of Lecture Notes in Computer Science, pages 34-46. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2836
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
35
-
-
23944519368
-
A ring signature scheme using bilinear pairings
-
Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, Jeju Island, Korea, August. Springer-Verlag
-
Jing Xu, Zhenfeng Zhang, and Dengguo Feng. A Ring Signature Scheme Using Bilinear Pairings. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 163-172, Jeju Island, Korea, August 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 163-172
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
36
-
-
24144434019
-
Fast and proven secure blind identity-based signcryption from pairings
-
A. J. Menezes, editor, Topics in Cryptology - CT - RSA 2005, The Cryptographers ' Track at the RSA Conference 2005, San Francisco, CA, USA, Febrary 14-18, 2005, Proceedings, San Francisco, CA, USA, February. Springer. To Appear. Also available at Cryptology ePrint Archive, Report 2004/121
-
Tsz Hon Yuen and Victor K. Wei. Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. In A. J. Menezes, editor, Topics in Cryptology - CT - RSA 2005, The Cryptographers ' Track at the RSA Conference 2005, San Francisco, CA, USA, Febrary 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, San Francisco, CA, USA, February 2005. Springer. To Appear. Also available at Cryptology ePrint Archive, Report 2004/121.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
-
-
Tsz Hon Yuen1
Wei, V.K.2
-
37
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, Springer
-
Fangguo Zhang and Kwangjo Kim. ID-Based Blind Signature and Ring Signature from Pairings. In Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 533-547. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
38
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its application
-
Feng Bao, Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Springer
-
Fangguo Zhang, Rei Safavi-Naini, and Willy Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In Feng Bao, Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, volume 2947 of Lecture Notes in Computer Science, pages 277-290. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
39
-
-
21144446236
-
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings
-
Fangguo Zhang, Reihaneh Safavi-Naini, and Chih-Yin Lin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/104, 2003. Available at http://eprint.iacr.org.
-
(2003)
Cryptology ePrint Archive, Report
, vol.2003
, Issue.104
-
-
Zhang, F.1
Safavi-Naini, R.2
Lin, C.-Y.3
|