-
1
-
-
33646832774
-
Identity-based threshold decryption
-
to appear in
-
J. Baek and, Y. Zheng, "Identity-Based Threshold Decryption", to appear in Proc. of PKC 2004.
-
(2004)
Proc. of PKC
-
-
Baek, J.1
Zheng, Y.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols", Proc. of the First ACM CCCS, pp 62-73, ACM Press, 1993.
-
(1993)
Proc. of the First ACM CCCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Proc. of CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing", Proc. of CRYPTO 2001, LNCS 2139, pp 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
1IEICE
-
M. Cerecedo, M. Matsumoto and H. Imai, "Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms", IEICE Trans. Fundamentals., Vol. E76-A, pp 532-545,1IEICE, 1993.
-
(1993)
IEICE Trans. Fundamentals
, vol.E76-A
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, M.2
Imai, H.3
-
6
-
-
35248844436
-
An identity-based signature from gap diffie-hellman groups
-
Proc. of PKC 2003, Springer-Verlag
-
J. Cha and J. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups", Proc. of PKC 2003, LNCS 2567, pp 18-30, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
-
7
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
IEEE
-
P. Feldman, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing", Proc. of the FOCS, pp 427-437, IEEE, 1987.
-
(1987)
Proc. of the FOCS
, pp. 427-437
-
-
Feldman, P.1
-
8
-
-
84947926543
-
Robust threshold DSS signatures
-
Proc. of EUROCRYPT '96, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, "Robust Threshold DSS Signatures", Proc. of EUROCRYPT '96, LNCS 1070, pp 354-371, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystem
-
Proc. of EUROCRYPT '99, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, "Secure Distributed Key Generation for Discrete-Log Based Cryptosystem", Proc. of EUROCRYPT '99, LNCS 1592, pp 295-310, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM Journal on Computing, 17, 2, pp 281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Proc. of SAC 2002, Springer-Verlag
-
F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings", Proc. of SAC 2002, LNCS 2595, pp 310-324, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
12
-
-
84958550160
-
The weil and tate pairings as building blocks for public key cryptosystems
-
Proc. of ANTS-V, Springer-Verlag
-
A. Joux, "The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems", Proc. of ANTS-V, LNCS 2369, pp 20-32, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
13
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Proc. of EUROCRYPT '91, Springer-Verlag
-
T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", Proc. of EUROCRYPT '91, LNCS 576, pp 129-140, Springer-Verlag,1992.
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, pp 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. of CRYPTO '84, Springer-Verlag
-
A. Shamir, "Identity-based Cryptosystems and Signature Schemes", Proc. of CRYPTO '84, LNCS 196, pp 47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|