-
2
-
-
33646712710
-
Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
-
LNCS. Springer-Verlag
-
J. Herranz and G. Sez. Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures. In Proceedings of Financial Cryptography 2003, LNCS. Springer-Verlag, 2003.
-
(2003)
Proceedings of Financial Cryptography 2003
-
-
Herranz, J.1
Sez, G.2
-
4
-
-
14244269187
-
A scheme for obtaining a warrant message from the digital proxy signatures
-
S. Lal and A. K. Awasthi. A scheme for obtaining a warrant message from the digital proxy signatures. Cryptology ePrint Archive, Report 2003/073. Available at http://eprint.iacr.org/, 2003.
-
(2003)
Cryptology EPrint Archive, Report
, vol.2003
, Issue.73
-
-
Lal, S.1
Awasthi, A.K.2
-
5
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
ICICS 2001. Springer-Verlag
-
H.-U. Park and L.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. In ICICS 2001, volume 2229 of LNCS, 451-455. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2229
, pp. 451-455
-
-
Park, H.-U.1
Lee, L.-Y.2
-
9
-
-
35048851224
-
The hierarchy of key evolving signatures and a characterization of proxy signatures
-
Eurocrypt 2004, Springer-Verlag
-
T.Malkin, S.Obana and M.Yung. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. Eurocrypt 2004, LNCS 3027, 306-322, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 306-322
-
-
Malkin, T.1
Obana, S.2
Yung, M.3
-
10
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto 1984, Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984, LNCS 196, 47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
11
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-Crypto 2001, Springer-Verlag
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, 514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
84958550160
-
The weil and tate pairings as building blocks for public key cryptosystems
-
ANTS 2002, Springer-Verlag
-
A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, ANTS 2002, LNCS 2369, 20-32, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
14
-
-
35048848152
-
Short signatures without random oracles
-
Eurocrypt 2004, Springer-Verlag
-
D.Boneh and X.Boyen, Short Signatures Without Random Oracles. Eurocrypt 2004, LNCS 3027, 56-73, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
15
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Advances in Cryptology-Eurocrypt 2004, Springer-Verlag
-
M.Bellare, C.Namprempre and G.Neven. Security Proofs for Identity-Based Identification and Signature Schemes, Advances in Cryptology-Eurocrypt 2004,LNCS 3027,268-286,Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
|