메뉴 건너뛰기




Volumn 3481, Issue II, 2005, Pages 614-623

Linkable ring signatures: Security models and new schemes

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; MATHEMATICAL MODELS; POLYNOMIALS; SECURITY OF DATA;

EID: 24944589673     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11424826_65     Document Type: Conference Paper
Times cited : (79)

References (13)
  • 1
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n signatures from a variety of keys
    • Springer-Verlag. Lecture Notes in Computer Science No. 2501
    • M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n signatures from a variety of keys. In Proc. ASIACRYPT 2002, pages 415-432. Springer-Verlag, 2002. Lecture Notes in Computer Science No. 2501.
    • (2002) Proc. ASIACRYPT 2002 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 2
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Springer-Verlag. Lecture Notes in Computer Science No. 2656
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proc. EUROCRYPT 2003, pages 614-629. Springer-Verlag, 2003. Lecture Notes in Computer Science No. 2656.
    • (2003) Proc. EUROCRYPT 2003 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 4
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Springer-Verlag. Lecture Notes in Computer Science No. 2656
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. EUROCRYPT 2003, pages 416-432. Springer-Verlag, 2003. Lecture Notes in Computer Science No. 2656.
    • (2003) Proc. EUROCRYPT 2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 5
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • Springer-Verlag. Lecture Notes in Computer Science No. 2442
    • E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In Proc. CRYPTO 2002, pages 465-480. Springer-Verlag, 2002. Lecture Notes in Computer Science No. 2442.
    • (2002) Proc. CRYPTO 2002 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 6
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Springer-Verlag. Lecture Notes in Computer Science No. 1294
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Proc. CRYPTO 97, pages 410-424. Springer-Verlag, 1997. Lecture Notes in Computer Science No. 1294.
    • (1997) Proc. CRYPTO 97 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 7
    • 85024290278 scopus 로고
    • Group signatures
    • Springer-Verlag. Lecture Notes in Computer Science No. 547
    • D. Chaum and E. Van Heyst. Group signatures. In Proc. EUROCRYPT 91, pages 257-265. Springer-Verlag, 1991. Lecture Notes in Computer Science No. 547.
    • (1991) Proc. EUROCRYPT 91 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer-Verlag. Lecture Notes in Computer Science No. 263
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. CRYPTO 86, pages 186-199. Springer-Verlag, 1987. Lecture Notes in Computer Science No. 263.
    • (1987) Proc. CRYPTO 86 , pp. 186-199
    • Fiat, A.1    Shamir, A.2
  • 11
    • 84957705622 scopus 로고    scopus 로고
    • On concrete security treatment of signatures derived from identification
    • Springer-Verlag. Lecture Notes in Computer Science No. 1462
    • K. Ohta and T. Okamoto. On concrete security treatment of signatures derived from identification. In Proc. CRYPTO 98, pages 354-369. Springer-Verlag, 1998. Lecture Notes in Computer Science No. 1462.
    • (1998) Proc. CRYPTO 98 , pp. 354-369
    • Ohta, K.1    Okamoto, T.2
  • 12
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Springer-Verlag. Lecture Notes in Computer Science No. 1070
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Proc. EUROCRYPT 96, pages 387-398. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1070.
    • (1996) Proc. EUROCRYPT 96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 13
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Springer-Verlag. Lecture Notes in Computer Science No. 2248
    • R. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In Proc. ASIACRYPT 2001, pages 552-565. Springer-Verlag, 2001. Lecture Notes in Computer Science No. 2248.
    • (2001) Proc. ASIACRYPT 2001 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.