메뉴 건너뛰기




Volumn 3810 LNCS, Issue , 2005, Pages 120-133

Efficient identity-based signatures and blind signatures

Author keywords

Bilinear pairings; Blind signature; Gap Diffie Hellman group; Identity based; Signature

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; DATA PRIVACY; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33744787065     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11599371_11     Document Type: Conference Paper
Times cited : (58)

References (20)
  • 1
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairingbased cryptosystems
    • Lecture Notes in Computer Science, Springer-Verlag
    • P. Barreto, H. Kim, B. Lynn and M. Scott, Efficient algorithms for pairingbased cryptosystems, In: Advances in Cryptology-Crypto 2002, Lecture Notes in Computer Science, Vol.2442, Springer-Verlag, 2002, pp.354- 368.
    • (2002) Advances in Cryptology-crypto 2002 , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, In: Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science, Vol.2139, Springer-Verlag, 2001, pp.213-229.
    • (2001) Advances in Cryptology - Crypto 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Lecture Notes in Computer Science, Springer-Verlag
    • D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, In: Advances in Cryptol-ogy-Asiacrypt 2001, Lecture Notes in Computer Science, Vol.2248, Springer-Verlag, 2001, pp.514-532.
    • (2001) Advances in Cryptol-ogy-asiacrypt 2001 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Lecture Notes in Computer Science, Springer- Verlag
    • J. Cha, J.Cheon, An identity-based signature from gap Diffie-Hellman groups, In: Public Key Cryp-tography - PKC 2003, Lecture Notes in Computer Science, Vol. 2567, Springer- Verlag, 2003, pp. 18-30.
    • (2003) Public Key Cryp-tography - PKC 2003 , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 5
    • 33645588715 scopus 로고    scopus 로고
    • Pairing-based cryptography: A survey
    • submission 2004/064
    • R. Dutta, R. Barua, P. Sarkar, Pairing-based cryptography: a survey, IACR preprint sever, submission 2004/064, 2004.
    • (2004) IACR Preprint Sever
    • Dutta, R.1    Barua, R.2    Sarkar, P.3
  • 6
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum, NY
    • D. Chaum, Blind signatures for untraceable payments, In: Advances in Cryptology-Crypto 82, 1983, Plenum, NY, pp.199-203.
    • (1983) Advances in Cryptology-crypto , vol.82 , pp. 199-203
    • Chaum, D.1
  • 7
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • G. Frey, H. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Mathematics of Computation, 1994, 62: 865-874.
    • (1994) Mathematics of Computation , vol.62 , pp. 865-874
    • Frey, G.1    Rück, H.2
  • 8
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate pairing
    • Lecture Notes in Computer Science, Springer-Verlag
    • S. Galbraith, K. Harrison and D. Soldera, Implementing the Tate pairing, In: Algorithm Number Theory Symposium- ANTS 2002, Lecture Notes in Computer Science, Vol.2369, Springer-Verlag, 2002, pp.324-337.
    • (2002) Algorithm Number Theory Symposium- ANTS 2002 , vol.2369 , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 9
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lecture Notes in Computer Science, Springer-Verlag
    • F. Hess, Efficient identity based signature schemes based on pairings, In: Selected Areas in Cryptography - SAC 2002, Lecture Notes in Computer Science, Vol.2595, Springer-Verlag, 2002, pp.310-324.
    • (2002) Selected Areas in Cryptography - SAC 2002 , vol.2595 , pp. 310-324
    • Hess, F.1
  • 10
    • 84958550160 scopus 로고    scopus 로고
    • The weil and tate pairings as building blocks for public key cryptosystems
    • Lecture Notes in Computer Science, Springer-Verlag
    • A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, In: Algorithm Number Theory Symposium- ANTS 2002, Lecture Notes in Computer Science, Vol.2369, Springer-Verlag, 2002, pp.20-32.
    • (2002) Algorithm Number Theory Symposium- ANTS 2002 , vol.2369 , pp. 20-32
    • Joux, A.1
  • 12
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, 2002, 38(18):1025-1026.
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 13
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, J. of Cryptology, 2000, 13: 361-396.
    • (2000) J. of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 15
    • 84957026429 scopus 로고    scopus 로고
    • Security of blind discrete log signatures against interactive attacks
    • Lecture Notes in Computer Science, Springer-Verlag
    • C. Schnorr, Security of blind discrete log signatures against interactive attacks, In: Information and Communications Security - ICICS 2001, Lecture Notes in Computer Science, Vol.2229, Springer-Verlag, 2001, pp. 1-12.
    • (2001) Information and Communications Security - ICICS 2001 , vol.2229 , pp. 1-12
    • Schnorr, C.1
  • 16
    • 85020598353 scopus 로고
    • Identity-base cryptosystems and signature schemes
    • Lecture Notes in Computer Science, Springer-Verlag
    • A. Shamir, Identity-base cryptosystems and signature schemes, In: Advances in Cryptology - Crypto'84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, 1985, pp. 47-53.
    • (1985) Advances in Cryptology - Crypto'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 0038680685 scopus 로고    scopus 로고
    • Efficient ID-based authenticated key agreement protocol based on Weil pairing
    • K. Shim, Efficient ID-based authenticated key agreement protocol based on Weil pairing, Electronics Letters, 2003, 39(8): 653-654.
    • (2003) Electronics Letters , vol.39 , Issue.8 , pp. 653-654
    • Shim, K.1
  • 18
    • 0037461946 scopus 로고    scopus 로고
    • Efficient ID-based key agreement from Weil pairing
    • X. Yi, Efficient ID-based key agreement from Weil pairing, Electronics Letters, 2003, 39(2): 206-208.
    • (2003) Electronics Letters , vol.39 , Issue.2 , pp. 206-208
    • Yi, X.1
  • 19
    • 84958765355 scopus 로고    scopus 로고
    • ID-based blind signature and ring signature from pairings
    • Lecture Notes in Computer Science, Springer-Verlag
    • F. Zhang, K. Kim, ID-based blind signature and ring signature from pairings, In: Advances in Cryptology - Asiacrpt2002, Lecture Notes in Computer Science, Vol.2501, Springer-Verlag, 2002, pp.533-547.
    • (2002) Advances in Cryptology - Asiacrpt2002 , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 20
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings
    • Lecture Notes in Computer Science, Springer-Verlag
    • F. Zhang, K. Kim, Efficient ID-based blind signature and proxy signature from bilinear pairings, In: Proc. of ACISP2003 (The 8th Australasian Conference on Information Security and Privacy), Lecture Notes in Computer Science, Vol. 2727, Springer-Verlag, 2003, pp.312-3323.
    • (2003) Proc. of ACISP2003 (The 8th Australasian Conference on Information Security and Privacy) , vol.2727 , pp. 312-3323
    • Zhang, F.1    Kim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.