-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
Eurocrypt'02. Springer
-
J.-H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Eurocrypt'02, volume 2332 of LNCS, pages 83-107. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.-H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
35048900981
-
On the selection of pairing-friendly groups
-
SAC'03. Springer
-
P. S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In SAC'03, volume 3006 of LNCS, pages 17-25. Springer, 2003.
-
(2003)
LNCS
, vol.3006
, pp. 17-25
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
4
-
-
27244440989
-
Pairing-friendly elliptic curves of prime order
-
P. S. L. M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. Cryptology ePrint Archive, Report 2005/133, 2005. http://eprint.iacr.org/2005/133.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.133
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
5
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Eurocrypt'04. Springer
-
M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In Eurocrypt'04, volume 3027 of LNCS, pages 268-286. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, USA. ACM Press
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, pages 62-73, Fairfax, USA, 1993. ACM Press.
-
(1993)
1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Eurocrypt'04. Springer
-
D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Crypto'04. Springer
-
D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In Crypto'04, volume 3152 of LNCS, pages 443-459. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048848152
-
Short signatures without random oracles
-
Eurocrypt'04. Springer
-
D. Boneh and X. Boyen. Short signatures without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 56-73. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Crypto'01. Springer
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
35248874429
-
Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
-
Crypto'03. Springer
-
X. Boyen. Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography. In Crypto'03, volume 2729 of LNCS, pages 383-399. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
12
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
PKC'03. Springer
-
J. C. Cha and J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In PKC'03, volume 2567 of LNCS, pages 18-30. Springer, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
13
-
-
33750714478
-
Security proof of Sakai-Kasahara's identity-based encryption scheme
-
L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. Cryptology ePrint Archive, Report 2005/226, 2005. http://eprint.iacr.org/2005/226.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.226
-
-
Chen, L.1
Cheng, Z.2
-
14
-
-
24144498013
-
Improved identity-based signcryption
-
PKC'05. Springer
-
L. Chen and J. Malone-Lee. Improved identity-based signcryption. In PKC'05, volume 3386 of LNCS, pages 362-379. Springer, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
15
-
-
34250336096
-
A new id-based signature with batch verification
-
J. H. Cheon, Y. Kim, and H. J. Yoon. A new id-based signature with batch verification. Cryptology ePrint Archive, Report 2004/131, 2004. http://eprint.iacr.org/2004/131.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.131
-
-
Cheon, J.H.1
Kim, Y.2
Yoon, H.J.3
-
16
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
6th International Conference on Information Security and Cryptology - ICISC'03. Springer
-
S. S. M. Chow, S. M. Yiu, L. C. K. Hui, and K. P. Chow. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In 6th International Conference on Information Security and Cryptology - ICISC'03, volume 2971 of LNCS, pages 352-369. Springer, 2003.
-
(2003)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
18
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
8th IMA International Conference. Springer
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In 8th IMA International Conference, volume 2260 of LNCS, pages 360-363. Springer, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
19
-
-
35248813300
-
Strong key-insulated signature schemes
-
PKC'03. Springer
-
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC'03, volume 2567 of LNCS, pages 130-144. Springer, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
20
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Crypto'86. Springer
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Crypto'86, volume 0263 of LNCS, pages 186-194. Springer, 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
21
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Asiacrypt'02. Springer
-
C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Asiacrypt'02, volume 2501 of LNCS, pages 548-566. Springer, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
22
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
S. Goldwasser, S. Micali, and R. Rivers t. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal of Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivers, R.T.3
-
23
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
Crypto'88. Springer
-
L. Guillou and J.-J. Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In Crypto'88, volume 0403 of LNCS, pages 216-231. Springer, 1988.
-
(1988)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.-J.2
-
24
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
SAC'02. Springer
-
F. Heß. Efficient identity based signature schemes based on pairings. In SAC'02, volume 2595 of LNCS, pages 310-324. Springer, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Heß, F.1
-
25
-
-
33646757123
-
Identity-based identification without random oracles
-
LNCS. Springer. To appear
-
K. Kurosawa and S.-H. Heng. Identity-based identification without random oracles. In ISH'05, LNCS. Springer, 2005. To appear.
-
(2005)
ISH'05
-
-
Kurosawa, K.1
Heng, S.-H.2
-
26
-
-
84939205648
-
New identity based signcryption schemes from pairings
-
Paris, France
-
B. Libert and J.-J. Quisquater. New identity based signcryption schemes from pairings. In IEEE Information Theory Workshop, Paris, France, 2003. http://eprint.iacr.org/2003/023.
-
(2003)
IEEE Information Theory Workshop
-
-
Libert, B.1
Quisquater, J.-J.2
-
27
-
-
0242445175
-
Identity-based signcryption
-
J. Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/2002/098.
-
(2002)
Cryptology ePrint Archive, Report
, vol.2002
, Issue.98
-
-
Malone-Lee, J.1
-
28
-
-
33646848363
-
Efficient and forward-secure identity-based signcryption
-
N. McCullagh and P. S. L. M. Barreto. Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report 2004/117, 2004. http://eprint.iacr.org/2004/117.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.117
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
29
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5):1234-1243, 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
30
-
-
33645596850
-
Signcryption scheme for identity-based cryptosystems
-
D. Nalla and K. C. Reddy. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2003. http://eprint.iacr.org/2003/066.
-
(2003)
Cryptology ePrint Archive, Report
, vol.2003
, Issue.66
-
-
Nalla, D.1
Reddy, K.C.2
-
31
-
-
84927727752
-
Security proofs for signature schemes
-
Eurocrypt'96. Springer
-
D. Pointcheval and J. Stern. Security proofs for signature schemes. In Eurocrypt'96, volume 1992 of LNCS, pages 387-398. Springer, 1996.
-
(1996)
LNCS
, vol.1992
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
32
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
33
-
-
33645608384
-
ID based cryptosystems with pairing on elliptic curve
-
Hamamatsu, Japan
-
R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. In SCIS'03, Hamamatsu, Japan, 2003. http://eprint.iacr.org/2003/054.
-
(2003)
SCIS'03
-
-
Sakai, R.1
Kasahara, M.2
-
34
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Crypto'84. Springer
-
A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 0196 of LNCS, pages 47-53. Springer, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
35
-
-
33646817646
-
On computable isomorphisms in efficient pairing based systems
-
N. P. Smart and F. Vercauteren. On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116, 2005. http://eprint.iacr.org/2005/116.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.116
-
-
Smart, N.P.1
Vercauteren, F.2
-
36
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Eurocrypt'05. Springer
-
B. Waters. Efficient identity-based encryption without random oracles. In Eurocrypt'05, volume 3494 of LNCS, pages 114-127. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
37
-
-
24144434019
-
Fast and proven secure blind identity-based signcryption from pairings
-
CT-RSA '05. Springer
-
T. H. Yuen and V. K. Wei. Fast and proven secure blind identity-based signcryption from pairings. In CT-RSA '05, volume 3376 of LNCS, pages 305-322. Springer, 2003.
-
(2003)
LNCS
, vol.3376
, pp. 305-322
-
-
Yuen, T.H.1
Wei, V.K.2
-
38
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
PKC'04. Springer
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC'04, volume 2947 of LNCS, pages 277-290. Springer, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
39
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) cost(signature) + cost(encryption)
-
Crypto'97. Springer
-
Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) cost(signature) + cost(encryption). In Crypto'97, volume 1294 of LNCS, pages 165-179. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|