-
1
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
LNCS
-
D. Boneh, X. Boyen and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of EUROCRYPT 2005, LNCS, 2005.
-
(2005)
Proceedings of EUROCRYPT 2005
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
2
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proceedings of EUROCRYPT 2003
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of EUROCRYPT 2003, volume 2656 of LNCS, pages 416-432, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
3
-
-
35048843296
-
Secure hierarchical identity based signature and its application
-
S. S. M. Chow, L. C. K. Hui, S. M. Yiu, and K. P. Chow. Secure hierarchical identity based signature and its application. In Proceedings of ICICS 2004, pages 480-494, 2004.
-
(2004)
Proceedings of ICICS 2004
, pp. 480-494
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
Chow, K.P.4
-
4
-
-
70349557354
-
Hierarchical id-based cryptography
-
Proceedings of ASIA CRYPT 2002
-
Craig Gentry and Alice Silverberg. Hierarchical id-based cryptography. In Proceedings of ASIA CRYPT 2002, volume 2501 of LNCS, pages 548-566, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
5
-
-
84958749510
-
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
-
Proceedings of ASIACRYPT 2002
-
Alejandro Hevia and Daniele Micciancio. The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. In Proceedings of ASIACRYPT 2002, volume 2501 of LNCS, pages 379-396, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 379-396
-
-
Hevia, A.1
Micciancio, D.2
-
7
-
-
84944905011
-
Homomorphic signature schemes
-
Proceedings of CT-RSA 2002
-
Robert Johnson, David Molnar, Dawn Xiaodong Song, and David Wagner. Homomorphic signature schemes. In Proceedings of CT-RSA 2002, volume 2271 of LNCS, pages 244-262, 2002.
-
(2002)
LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Dawn Xiaodong Song3
Wagner, D.4
-
8
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
Stephen Kent, Charles Lynn, and Karen Seo. Secure border gateway protocol (S-BGP). In IEEE Journal on Selected Areas in Communications, 18(4):582-592, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
10
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
Proceedings of EUROCRYPT 2004
-
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, and Hovav Shacham. Sequential aggregate signatures from trapdoor permutations. In Proceedings of EUROCRYPT 2004, volume 3027 of LNCS, pages 74-90, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
11
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Proceedings of CRYPTO'87
-
Ralph C. Merkle. A digital signature based on a conventional encryption function. In Proceedings of CRYPTO'87, volume 293 of LNCS, pages 369-378, 1988.
-
(1988)
LNCS
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
12
-
-
84944878224
-
Transitive signature schemes
-
Proceedings of CT-RSA 2002
-
Silvio Micali and Ronald L. Rivest. Transitive signature schemes. In Proceedings of CT-RSA 2002, volume 2271 of LNCS, pages 236-243, 2002.
-
(2002)
LNCS
, vol.2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proceedings of CRYPTO'84
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO'84, volume 196 of LNCS, pages 47-53, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|