메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 218-232

Identity based threshold ring signature

Author keywords

Anonymity; Bilinear pairings; Identity based signature; Spontaneity; Threshold ring signature

Indexed keywords

CRYPTOGRAPHY; IDENTIFICATION (CONTROL SYSTEMS); MATHEMATICAL MODELS; MATHEMATICAL OPERATORS; SECURITY OF DATA;

EID: 24944525692     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_17     Document Type: Conference Paper
Times cited : (68)

References (39)
  • 1
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n signatures from a variety of keys
    • Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Springer
    • Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 415-432. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 2
    • 26444521603 scopus 로고    scopus 로고
    • ID-based ring signature and proxy ring signature schemes from bilinear pairings
    • Amit K Awasthi and Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, 2004. Available at http://eprint.iacr.org.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.184
    • Awasthi, A.K.1    Lal, S.2
  • 3
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Springer-Verlag Heidelberg
    • Paulo S.L.M. Barreto, Hae Y. Kim, Ben Lynn, and Michael Scott. Efficient Algorithms for Pairing-Based Cryptosystems. In Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag Heidelberg, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. Springer-Verlag Heidelberg
    • Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag Heidelberg, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings. Springer
    • Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 7
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • Moti Yung, editor, Advances in Cryptology CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings. Springer
    • Emmanuel Bresson, Jacques Stern, and Michael Szydlo. Threshold Ring Signatures and Applications to Ad-hoc Groups. In Moti Yung, editor, Advances in Cryptology CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 8
    • 23944497675 scopus 로고    scopus 로고
    • Blind spontaneous anonymous group signatures for ad hoc groups
    • 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August 5-6, 2004. Springer
    • Tony K. Chan, Karyin Fung, Joseph K. Liu, and Victor K. Wei. Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August 5-6, 2004, volume 3313 of Lecture Notes in Computer Science. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3313
    • Chan, T.K.1    Fung, K.2    Liu, J.K.3    Wei, V.K.4
  • 9
    • 85024290278 scopus 로고
    • Group signatures
    • Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Springer
    • David Chaum and Eugène van Heyst. Group Signatures. In Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 10
    • 23944466280 scopus 로고    scopus 로고
    • Implementation of tate pairing of hyperelliptic curves of genus 2
    • Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
    • YoungJu Choie and Eunjeong Lee. Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 97-111. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2971 , pp. 97-111
    • Choie, Y.1    Lee, E.2
  • 11
    • 23944444766 scopus 로고    scopus 로고
    • Verifiable pairing and its applications
    • Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, Revised Papers. Springer-Verlag
    • Sherman S.M. Chow. Verifiable Pairing and Its Applications. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 173-187. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 173-187
    • Chow, S.S.M.1
  • 13
  • 14
    • 35048843296 scopus 로고    scopus 로고
    • Secure hierarchical identity based signature and its application
    • Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Springer-Verlag
    • Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow. Secure Hierarchical Identity Based Signature and its Application. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 480-494. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3269 , pp. 480-494
    • Chow, S.S.M.1    Hui, L.C.K.2    Yiu, S.M.3    Chow, K.P.4
  • 16
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
    • Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 352-369. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 17
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings. Springer
    • Ronald Cramer, Ivan Damgard, and Berry Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 18
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in ad hoc groups
    • Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Springer
    • Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, and Victor Shoup. Anonymous Identification in Ad Hoc Groups. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 609-626. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 19
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the tate pairing
    • Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings. Springer
    • Steven D. Galbraith, Keith Harrison, and David Soldera. Implementing the Tate Pairing. In Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, volume 2369 of Lecture Notes in Computer Science, pages 324-337. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2369 , pp. 324-337
    • Galbraith, S.D.1    Harrison, K.2    Soldera, D.3
  • 20
    • 0242372952 scopus 로고    scopus 로고
    • A ring signature scheme based on the nyberg-rueppel signature scheme
    • Jianying Zhou, Moti Yung, and Yongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 Proceedings. Springer
    • Chong Zhi Gao, Zheng an Yao, and Lei Li. A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. In Jianying Zhou, Moti Yung, and Yongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 Proceedings, volume 2846 of Lecture Notes in Computer Science, pages 169-175. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2846 , pp. 169-175
    • Chong Zhi Gao1    Zheng An Yao2    Li, L.3
  • 21
    • 35048814061 scopus 로고    scopus 로고
    • Distributed ring signatures for identity-based scenarios
    • Javier Herranz and Germán Sáez. Distributed Ring Signatures for Identity-Based Scenarios. Cryptology ePrint Archive, Report 2004/190, 2004. Available at http://eprint.iacr.org.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.190
    • Herranz, J.1    Sáez, G.2
  • 22
    • 24944588207 scopus 로고    scopus 로고
    • New identity-based ring signature schemes
    • Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, Malaga, Spain, October. Springer-Verlag. Preliminary version available at Cryptology ePrint Archive, Report 2003/261
    • Javier Herranz and Germán Sáez. New Identity-Based Ring Signature Schemes. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 27-39, Malaga, Spain, October 2004. Springer-Verlag. Preliminary version available at Cryptology ePrint Archive, Report 2003/261.
    • (2004) Lecture Notes in Computer Science , vol.3269 , pp. 27-39
    • Herranz, J.1    Sáez, G.2
  • 23
    • 33745294595 scopus 로고    scopus 로고
    • An identity-based ring signature scheme from bilinear pairings
    • Chih-Yin Lin and Tzong-Chen Wu. An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/117, 2003. Available at http://eprint.iacr.org.
    • (2003) Cryptology ePrint Archive, Report , vol.2003 , Issue.117
    • Lin, C.-Y.1    Wu, T.-C.2
  • 24
    • 33645420820 scopus 로고    scopus 로고
    • A separable threshold ring signature scheme
    • Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers. Springer
    • Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. A Separable Threshold Ring Signature Scheme. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th International Conference Seoul, Korea, November 27-28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 352-369. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2971 , pp. 352-369
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 27
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • January
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 26(1):96-99, January 1983.
    • (1983) Communications of the ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 28
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Springer
    • Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to Leak a Secret. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 30
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Springer-Verlag, 19-22 August
    • Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In G. R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 19-22 August 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 32
    • 24644503853 scopus 로고    scopus 로고
    • Separable linkable threshold ring signatures
    • Anne Canteaut and Kapalee Viswanathan, editors, Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings. Springer
    • Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, and Duncan S. Wong. Separable Linkable Threshold Ring Signatures. In Anne Canteaut and Kapalee Viswanathan, editors, Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, volume 3348 of Lecture Notes in Computer Science, pages 384-398. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3348 , pp. 384-398
    • Tsang, P.P.1    Wei, V.K.2    Chan, T.K.3    Au, M.H.4    Liu, J.K.5    Wong, D.S.6
  • 33
    • 33646021210 scopus 로고    scopus 로고
    • A bilinear spontaneous anonymous threshold signature for ad hoc groups
    • Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. Cryptology ePrint Archive, Report 2004/039, 2004. Available at http://eprint.iacr.org.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.39
    • Wei, V.K.1
  • 34
    • 0142218983 scopus 로고    scopus 로고
    • On the RS-code construction of ring signature schemes and a threshold setting of RST
    • Sihan Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Springer
    • Duncan S. Wong, Karyin Fung, Joseph K. Liu, and Victor K. Wei. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. In Sihan Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, volume 2836 of Lecture Notes in Computer Science, pages 34-46. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2836 , pp. 34-46
    • Wong, D.S.1    Fung, K.2    Liu, J.K.3    Wei, V.K.4
  • 35
    • 23944519368 scopus 로고    scopus 로고
    • A ring signature scheme using bilinear pairings
    • Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, Jeju Island, Korea, August. Springer-Verlag
    • Jing Xu, Zhenfeng Zhang, and Dengguo Feng. A Ring Signature Scheme Using Bilinear Pairings. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 163-172, Jeju Island, Korea, August 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 163-172
    • Xu, J.1    Zhang, Z.2    Feng, D.3
  • 36
    • 24144434019 scopus 로고    scopus 로고
    • Fast and proven secure blind identity-based signcryption from pairings
    • A. J. Menezes, editor, Topics in Cryptology - CT - RSA 2005, The Cryptographers ' Track at the RSA Conference 2005, San Francisco, CA, USA, Febrary 14-18, 2005, Proceedings, San Francisco, CA, USA, February. Springer. To Appear. Also available at Cryptology ePrint Archive, Report 2004/121
    • Tsz Hon Yuen and Victor K. Wei. Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. In A. J. Menezes, editor, Topics in Cryptology - CT - RSA 2005, The Cryptographers ' Track at the RSA Conference 2005, San Francisco, CA, USA, Febrary 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, San Francisco, CA, USA, February 2005. Springer. To Appear. Also available at Cryptology ePrint Archive, Report 2004/121.
    • (2005) Lecture Notes in Computer Science , vol.3376
    • Tsz Hon Yuen1    Wei, V.K.2
  • 37
    • 84958765355 scopus 로고    scopus 로고
    • ID-based blind signature and ring signature from pairings
    • Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, Springer
    • Fangguo Zhang and Kwangjo Kim. ID-Based Blind Signature and Ring Signature from Pairings. In Yuliang Zheng, editor, Advances in Cryptology ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 533-547. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 38
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its application
    • Feng Bao, Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Springer
    • Fangguo Zhang, Rei Safavi-Naini, and Willy Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In Feng Bao, Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, volume 2947 of Lecture Notes in Computer Science, pages 277-290. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 39
    • 21144446236 scopus 로고    scopus 로고
    • New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings
    • Fangguo Zhang, Reihaneh Safavi-Naini, and Chih-Yin Lin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/104, 2003. Available at http://eprint.iacr.org.
    • (2003) Cryptology ePrint Archive, Report , vol.2003 , Issue.104
    • Zhang, F.1    Safavi-Naini, R.2    Lin, C.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.