-
1
-
-
0031632567
-
Concurrent zero-knowledge
-
Dallas TX, USA
-
C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, Proc. 30th ACM STOC '98, Dallas TX, USA, 1998, pp. 409-418.
-
(1998)
Proc. 30th ACM STOC '98
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
3
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
L. Fan, C.X. Xu, J.H. Li, Deniable authentication protocol based on Diffie-Hellman algorithm, Electronics Letters 38(4) (2002) 705-706.
-
(2002)
Electronics Letters
, vol.38
, Issue.4
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
4
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Z. Shao, Efficient deniable authentication protocol based on generalized ElGamal signature scheme, Computer Standards & Interfaces, 26, 2004, pp.449-454.
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
5
-
-
0345058957
-
Universal designated-verifier signatures
-
Advances in Cryptology-Asiacrypt'2003, Springer-Verlag
-
R. Steinfeld, L. Bull, H. Wang, J. Pieprzyk, Universal Designated-Verifier Signatures, Advances in Cryptology-Asiacrypt'2003, Lecture Notes on Computer Science 2894, Springer-Verlag, 2004, pp 523-542.
-
(2004)
Lecture Notes on Computer Science
, vol.2894
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
6
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto 84, Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, Springer-Verlag, 1984, pp.47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-Crypto 2001, Springer-Verlag
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, 2001, pp.213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM Journal on Computing, 32(3), 2003, pp.586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Advances in Cryptology - Eurocrypt'2004, Springer-Verlag
-
D. Boneh, X. Boyen, Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, Advances in Cryptology - Eurocrypt'2004, Lecture Notes on Computer Science 3027, Springer-Verlag, 2004, pp. 223-238.
-
(2004)
Lecture Notes on Computer Science
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Practice and Theory in Public Key Cryptography - PKC'2003, Springer-Verlag
-
JC Cha, JH Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, Practice and Theory in Public Key Cryptography - PKC'2003, LNCS 2567, Springer-Verlag 2003, pp. 18-30.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
11
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Proceedings of 9th workshop on selected areas in cryptography -SAC 2002. K. Nyberg and H. Heys (Eds.). Springer-Verlag
-
F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryptography -SAC 2002. K. Nyberg and H. Heys (Eds.): Lecture Notes in Computer Science 2595. Springer-Verlag, 2003, pp. 310-324.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
12
-
-
1642358858
-
Cryptosystems based on pairing
-
Okinawa, Japan, January 26-28
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In The 2000 Sympoium on Cryptography and Information Security, Okinawa, Japan, January 26-28, 2000.
-
(2000)
The 2000 Sympoium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
14
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
2004 Applied Cryptography and Network Security (ACNS'04), Springer-Verlag
-
C. Boyd, W. Mao, K. Paterson. Key agreement using statically keyed authenticators, 2004 Applied Cryptography and Network Security (ACNS'04), Lecture Notes in Computer Science 3089, Springer-Verlag, 2004, pp. 248-262.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
|