-
1
-
-
84929273746
-
Untraceable electronic cash
-
Advances in Cryptology-CRYPTO 1988, Proceedings of the 8th Annual International Cryptology Conference, August 21-25, 1988, Santa Barbara, CA, USA, S. Goldwasser Springer New York
-
D. Chaum, A. Fiat, and M. Naor Untraceable electronic cash S. Goldwasser Advances in Cryptology-CRYPTO 1988, Proceedings of the 8th Annual International Cryptology Conference, August 21-25, 1988, Santa Barbara, CA, USA Lecture Notes in Computer Science vol. 403 1990 Springer New York
-
(1990)
Lecture Notes in Computer Science
, vol.403
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
3
-
-
85032463527
-
Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms
-
Advances in Cryptology-AUSCRYPT '90, Proceedings of the International Conference on Cryptology, January 8-11, 1990, Sydney, Australia, J. Seberry J. Pieprzyk Springer New York
-
D. Chaum Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms J. Seberry J. Pieprzyk Advances in Cryptology-AUSCRYPT '90, Proceedings of the International Conference on Cryptology, January 8-11, 1990, Sydney, Australia Lecture Notes in Computer Science vol. 453 1990 Springer New York
-
(1990)
Lecture Notes in Computer Science
, vol.453
-
-
Chaum, D.1
-
5
-
-
26044467742
-
Blind signature based steganographic protocol
-
May 24-25 Budapest, Hungary, 2001
-
J. Lenti, I. Loványi, Á. Nagy, Blind signature based steganographic protocol, in: Proceedings of IEEE International Workshop on Intelligent Signal Processing, May 24-25, 2001, Budapest, Hungary, 2001.
-
(2001)
Proceedings of IEEE International Workshop on Intelligent Signal Processing
-
-
Lenti, J.1
Loványi, I.2
Nagy, Á.3
-
6
-
-
0020832088
-
A public key cryptosystem suitable for digital multisignatures
-
K. Itakura, and K. Nakamura A public key cryptosystem suitable for digital multisignatures NEC Research & Development 71 1983 1 8
-
(1983)
NEC Research & Development
, vol.71
, pp. 1-8
-
-
Itakura, K.1
Nakamura, K.2
-
9
-
-
35248880074
-
Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme
-
Public Key Cryptography-PKC 2003, Proceedings of the Sixth International Workshop on Theory and Practice in Public Key Cryptography, January 6-8, 2003, Miami, FL, USA, Y. Desmedt Springer New York
-
A. Boldyreva Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme Y. Desmedt Public Key Cryptography-PKC 2003, Proceedings of the Sixth International Workshop on Theory and Practice in Public Key Cryptography, January 6-8, 2003, Miami, FL, USA Lecture Notes in Computer Science vol. 2567 2002 Springer New York
-
(2002)
Lecture Notes in Computer Science
, vol.2567
-
-
Boldyreva, A.1
-
10
-
-
26044479821
-
Classification of blind signature schemes and examples of hidden and weak blind signatures
-
Theoretical Computer Science and Information Security, Department of Computer Science, University of Technology Chemnitz-Zwickau, Germany, April
-
P. Horster, H. Petersen, Classification of blind signature schemes and examples of hidden and weak blind signatures, Technical Report TR-94-1-E, Theoretical Computer Science and Information Security, Department of Computer Science, University of Technology Chemnitz-Zwickau, Germany, April 1994.
-
(1994)
Technical Report
, vol.TR-94-1-E
-
-
Horster, P.1
Petersen, H.2
-
11
-
-
26044482837
-
Hidden signature schemes based on the discrete logarithm problem and related concepts
-
Theoretical Computer Science and Information Security, Department of Computer Science, University of Technology Chemnitz-Zwickau, Germany, April
-
P. Horster, M. Michels, H. Petersen, Hidden signature schemes based on the discrete logarithm problem and related concepts, Technical Report TR-94-40-R, Theoretical Computer Science and Information Security, Department of Computer Science, University of Technology Chemnitz-Zwickau, Germany, April 1995.
-
(1995)
Technical Report
, vol.TR-94-40-R
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
12
-
-
84955579666
-
Provably secure blind signature schemes
-
Advances in Cryptology-ASIACRYPT 1996, Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, November 3-7, 1996, Kyongju, Korea, K. Kim T. Matsumoto Springer New York
-
D. Pointcheval, and J. Stern Provably secure blind signature schemes K. Kim T. Matsumoto Advances in Cryptology-ASIACRYPT 1996, Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, November 3-7, 1996, Kyongju, Korea Lecture Notes in Computer Science vol. 1163 1996 Springer New York
-
(1996)
Lecture Notes in Computer Science
, vol.1163
-
-
Pointcheval, D.1
Stern, J.2
-
13
-
-
84957026429
-
Security of blind discrete log signatures against interactive attacks
-
Information and Communications Security, Third International Conference, ICICS 2001, November 13-16, 2001, Xian, China, S. Qing T. Okamoto J. Zhou Springer New York
-
C.-P. Schnorr Security of blind discrete log signatures against interactive attacks S. Qing T. Okamoto J. Zhou Information and Communications Security, Third International Conference, ICICS 2001, November 13-16, 2001, Xian, China Lecture Notes in Computer Science vol. 2229 2001 Springer New York
-
(2001)
Lecture Notes in Computer Science
, vol.2229
-
-
Schnorr, C.-P.1
-
14
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
Information Security and Privacy, Proceedings of the 8th Australasian Conference, ACISP 2003, July 9-11, 2003, Wollongong, Australia, R. Safavi-Naini J. Seberry Springer New York
-
F. Zhang, and K. Kim Efficient ID-based blind signature and proxy signature from bilinear pairings R. Safavi-Naini J. Seberry Information Security and Privacy, Proceedings of the 8th Australasian Conference, ACISP 2003, July 9-11, 2003, Wollongong, Australia Lecture Notes in Computer Science vol. 2727 2003 Springer New York
-
(2003)
Lecture Notes in Computer Science
, vol.2727
-
-
Zhang, F.1
Kim, K.2
-
16
-
-
79958074367
-
A forward-secure digital signature scheme
-
Advances in Cryptology-CRYPTO'99, Proceedings of the 19th Annual International Cryptology Conference, August 15-19, 1999, Santa Barbara, CA, USA, M.J. Wiener Springer New York
-
M. Bellare, and S.K. Miner A forward-secure digital signature scheme M.J. Wiener Advances in Cryptology-CRYPTO'99, Proceedings of the 19th Annual International Cryptology Conference, August 15-19, 1999, Santa Barbara, CA, USA Lecture Notes in Computer Science vol. 1666 1999 Springer New York
-
(1999)
Lecture Notes in Computer Science
, vol.1666
-
-
Bellare, M.1
Miner, S.K.2
-
17
-
-
84937427768
-
A new forward-secure digital signature scheme
-
Advances in Cryptology-ASIACRYPT 2000, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, December 3-7, 2000, Kyoto, Japan, T. Okamoto Springer New York
-
M. Abdalla, and L. Reyzin A new forward-secure digital signature scheme T. Okamoto Advances in Cryptology-ASIACRYPT 2000, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, December 3-7, 2000, Kyoto, Japan Lecture Notes in Computer Science vol. 1976 2000 Springer New York
-
(2000)
Lecture Notes in Computer Science
, vol.1976
-
-
Abdalla, M.1
Reyzin, L.2
-
18
-
-
84880879872
-
Forward-secure signatures with optimal signing and verifying
-
Advances in Cryptology-CRYPTO 2001, Proceedings of the 21st Annual International Cryptology Conference, August 19-23, 2001, Santa Barbara, CA, USA, J. Kilian Springer New York
-
G. Itkis, and L. Reyzin Forward-secure signatures with optimal signing and verifying J. Kilian Advances in Cryptology-CRYPTO 2001, Proceedings of the 21st Annual International Cryptology Conference, August 19-23, 2001, Santa Barbara, CA, USA Lecture Notes in Computer Science vol. 2139 2001 Springer New York
-
(2001)
Lecture Notes in Computer Science
, vol.2139
-
-
Itkis, G.1
Reyzin, L.2
-
19
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology, Proceedings of CRYPTO'86, 1986, Santa Barbara, CA, USA, A.M. Odlyzko Springer New York
-
A. Fiat, and A. Shamir How to prove yourself: practical solutions to identification and signature problems A.M. Odlyzko Advances in Cryptology, Proceedings of CRYPTO'86, 1986, Santa Barbara, CA, USA Lecture Notes in Computer Science vol. 263 1987 Springer New York
-
(1987)
Lecture Notes in Computer Science
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
21
-
-
35248842541
-
Forward-secure signatures with fast key update
-
Security in Communication Networks, Third International Conference, SCN 2002, September 11-13, 2002, Amalfi, Italy, S. Cimato C. Galdi G. Persiano Springer New York
-
A. Kozlov, and L. Reyzin Forward-secure signatures with fast key update S. Cimato C. Galdi G. Persiano Security in Communication Networks, Third International Conference, SCN 2002, September 11-13, 2002, Amalfi, Italy Lecture Notes in Computer Science vol. 2576 2003 Springer New York (Revised Papers)
-
(2003)
Lecture Notes in Computer Science
, vol.2576
-
-
Kozlov, A.1
Reyzin, L.2
-
22
-
-
33747840069
-
A new forward secure signature scheme using bilinear maps
-
Report 2003/188
-
F. Hu, C.-H. Wu, J.D. Irwin, A new forward secure signature scheme using bilinear maps, Cryptology ePrint Archive, Report 2003/188, 2003. Available from: < http://eprint.iacr.org >.
-
(2003)
Cryptology EPrint Archive
-
-
Hu, F.1
Wu, C.-H.2
Irwin, J.D.3
-
23
-
-
26044441463
-
Two forward-secure threshold signature schemes
-
Yellow Mountain, China, Technical Track Proceedings
-
S.S.M. Chow, H.W. Go, S.M. Yiu, L.C.K. Hui, K.P. Chow, Two forward-secure threshold signature schemes, in: Second International Conference of Applied Cryptography and Network Security (ACNS 2004), Yellow Mountain, China, Technical Track Proceedings, 2004, pp. 10-19.
-
(2004)
Second International Conference of Applied Cryptography and Network Security (ACNS 2004)
, pp. 10-19
-
-
Chow, S.S.M.1
Go, H.W.2
Yiu, S.M.3
Hui, L.C.K.4
Chow, K.P.5
-
24
-
-
0142218984
-
A forward-secure blind signature scheme based on the strong RSA assumption
-
Information and Communications Security, Proceedings of the Fifth International Conference, ICICS 2003, October 10-13, 2003, Huhehaote City, Inner-Mongolia, R.H. Deng S. Qing F. Bao J. Zhou Springer New York
-
D.N. Duc, J.H. Cheon, and K. Kim A forward-secure blind signature scheme based on the strong RSA assumption R.H. Deng S. Qing F. Bao J. Zhou Information and Communications Security, Proceedings of the Fifth International Conference, ICICS 2003, October 10-13, 2003, Huhehaote City, Inner-Mongolia Lecture Notes in Computer Science vol. 2836 2003 Springer New York
-
(2003)
Lecture Notes in Computer Science
, vol.2836
-
-
Duc, D.N.1
Cheon, J.H.2
Kim, K.3
-
25
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Advances in Cryptology-ASIACRYPT 2002, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, December 1-5, 2002, Queenstown, New Zealand, Y. Zheng Springer New York Available from:<
-
C. Gentry, and A. Silverberg Hierarchical ID-based cryptography Y. Zheng Advances in Cryptology-ASIACRYPT 2002, Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, December 1-5, 2002, Queenstown, New Zealand Lecture Notes in Computer Science vol. 2501 2002 Springer New York Available from: < http://eprint.iacr.org >
-
(2002)
Lecture Notes in Computer Science
, vol.2501
-
-
Gentry, C.1
Silverberg, A.2
-
26
-
-
23944526744
-
Two improved partially blind signature schemes from bilinear pairings
-
Report 2004/108, April
-
S.S.M. Chow, L.C.K. Hui, S.M. Yiu, K.P. Chow, Two improved partially blind signature schemes from bilinear pairings, Cryptology ePrint Archive, Report 2004/108, April 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology EPrint Archive
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
27
-
-
26444605076
-
Universal forgeability of a forward-secure blind signature scheme proposed by duc et al.
-
Report 2004/262, October 2004
-
L. Liu, Z. Cao, Universal forgeability of a forward-secure blind signature scheme proposed by duc et al., Cryptology ePrint Archive, Report 2004/262, October 2004. Available at http://eprint.iacr.org.
-
Cryptology EPrint Archive
-
-
Liu, L.1
Cao, Z.2
-
28
-
-
35048843296
-
Secure hierarchical identity based signature and its application
-
Malaga, Spain, October Lecture Notes in Computer Science, Springer. To Appear
-
S.S.M. Chow, L.C.K. Hui, S.M. Yiu, K.P. Chow, Secure hierarchical identity based signature and its application, in: 6th International Conference on Information and Communications Security, Malaga, Spain, October 2004, Lecture Notes in Computer Science, Springer. To Appear.
-
(2004)
6th International Conference on Information and Communications Security
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
29
-
-
26044479525
-
A new forward secure signature scheme
-
Report 2004/183, July
-
G. Kang, J.H. Park, S.G. Hahn, A new forward secure signature scheme, Cryptology ePrint Archive, Report 2004/183, July 2004. Available at http://eprint.iacr.org.
-
(2004)
Cryptology ePrint Archive
-
-
Kang, G.1
Park, J.H.2
Hahn, S.G.3
|