-
1
-
-
35248880074
-
Efficient threshold signature, multisignature and blind signaure schemes based on the gap-Difiie-Hellman-group signature schemes
-
PKC'2003
-
A. Boldyreva, Efficient threshold signature, multisignature and blind signaure schemes based on the gap-Difiie-Hellman-group signature schemes, In PKC'2003, LNCS vol. 1567, pp. 31-46, 2003.
-
(2003)
LNCS
, vol.1567
, pp. 31-46
-
-
Boldyreva, A.1
-
2
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Proceedings of PKC'98
-
F. Bao and R.-H. Deng, A signcryption scheme with signature directly verifiable by public key, In Proceedings of PKC'98, LNCS 1998, pp. 55-59, 1998.
-
(1998)
LNCS
, vol.1998
, pp. 55-59
-
-
Bao, F.1
Deng, R.-H.2
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
Prodeedings of Asiacrypt 2001
-
D. Boneh, B. Lymn and H. Shacham, Short signatures from the Weil pairing, Prodeedings of Asiacrypt 2001, Vol. 2248, LNCS, pp.514-532, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lymn, B.2
Shacham, H.3
-
6
-
-
85023809951
-
Threshold cryptosystems
-
Advances in Cryptology, Crypto'89
-
Y. Desmedt and Y. Frankel, Threshold cryptosystems, Advances in Cryptology, Crypto'89, LNCS Vol. 435, 1989.
-
(1989)
LNCS
, vol.435
-
-
Desmedt, Y.1
Frankel, Y.2
-
7
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosen message attacks, SIAM J. Comput. 17, 2, pp. 281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
8
-
-
0003900673
-
-
January
-
R. Housley, M. Ford, W. Polk, D.solo, Internet X.509 Public Key Infrastructure: certificate and CRL profile, http://www.ietf.org/rfc.html, January 1999.
-
(1999)
Internet X.509 Public Key Infrastructure: Certificate and CRL Profile
-
-
Housley, R.1
Ford, M.2
Polk, W.3
Solo, D.4
-
9
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
Advances in Cryptology, Crypto'95
-
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, Proactive secret sharing, or: How to cope with perpetual leakage, Advances in Cryptology, Crypto'95, LNCS Vol. 963, 1995.
-
(1995)
LNCS
, vol.963
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
10
-
-
21144454271
-
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
A. Joux and K. Nguyen, Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups, In Journal of Cryptology, vol. 16,No. 4, pp. 239-247, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
11
-
-
33744906982
-
Jointly unsigncryptable signcryption
-
Hyung Koo, Hyun-Jeong Kim, Ik Rae Jeong, Dong-Hoon Lee, and Jongin Lim, Jointly unsigncryptable signcryption, WISA 2001, Vol.2, pp. 397-407, 2001.
-
(2001)
WISA 2001
, vol.2
, pp. 397-407
-
-
Koo, H.1
Kim, H.-J.2
Jeong, I.R.3
Lee, D.-H.4
Lim, J.5
-
12
-
-
35048859269
-
Efficient signcryption with key privacy from gap-diffie-hellman groups
-
PKC'2004, Springer-Verlag
-
B. Libert, J.-J. Quisquater, Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman Groups, in PKC'2004, LNCS 2947, Springer-Verlag, pp. 187-200, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 187-200
-
-
Libert, B.1
Quisquater, J.-J.2
-
13
-
-
23944487277
-
Improved signcryption from q-Diffie-Hellman problems
-
SCN 2004
-
B. Libert, J.-J. Quisquater, Improved signcryption from q-Diffie-Hellman problems, SCN 2004, LNCS 3352, pp. 220-234, 2005.
-
(2005)
LNCS
, vol.3352
, pp. 220-234
-
-
Libert, B.1
Quisquater, J.-J.2
-
14
-
-
34347373013
-
Two birds one stone: Signcryption using RSA
-
Topics in Cryptology - proceedings of CT-RSA 2003. Springer
-
J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. In Topics in Cryptology - proceedings of CT-RSA 2003, LNCS 2612, pp. 211-225. Springer, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 211-225
-
-
Malone-Lee, J.1
Mao, W.2
-
15
-
-
33645964774
-
-
Digital signature standard, U.S. Department of Commerce
-
National Institute of Standards ans Technology, JIST FIPS PUB 186, Digital signature standard, U.S. Department of Commerce (1994).
-
(1994)
JIST FIPS PUB
, vol.186
-
-
-
17
-
-
35248891585
-
New DSA-verifiable signcryption schemes
-
Proceedings of ICISC'02
-
J.-B. Shin, K. Lee, and K. Shim, New DSA-verifiable signcryption schemes, In Proceedings of ICISC'02, LNCS 2587, pp. 35-47, 2000.
-
(2000)
LNCS
, vol.2587
, pp. 35-47
-
-
Shin, J.-B.1
Lee, K.2
Shim, K.3
-
18
-
-
84944242785
-
A signcryption scheme based on integer factorization
-
Proceedings of ISW00
-
R. Steinfeld and Y. Zheng, A signcryption scheme based on integer factorization, In Proceedings of ISW00, LNCS 1975, pp. 308-322, 2000.
-
(2000)
LNCS
, vol.1975
, pp. 308-322
-
-
Steinfeld, R.1
Zheng, Y.2
-
19
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
PKC'04
-
F. Zhang, R. Safavi-Naini, W. Susilo, An efficient signature scheme from bilinear pairings and its applications, PKC'04, LNCS 2947, pp. 277-290, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
20
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≤cost(signature) + cost(encryption)
-
Advances in Cryptology - Crypto'97
-
Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≤ cost(signature) + cost(encryption), In Advances in Cryptology - Crypto'97, LNCS 1294, pp. 165-179, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|