-
1
-
-
35048848152
-
Short signatures without random oracles
-
Advances in Cryptology, Proc. EUROCRYPT 2004. Springer-Verlag
-
D. Boneh and X. Boyen. Short signatures without random oracles. In Advances in Cryptology, Proc. EUROCRYPT 2004, LNCS 3027, pages 56-73. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology, Proc. CRYPTO 2001. Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology, Proc. CRYPTO 2001, LNCS 2139, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology-ASIACRYPT 2001. Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, pages 514-532. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
35048854587
-
An efficient signature scheme from bi-linear pairings and its applications
-
Public Key Cryptography (PKC'04). Springer-Verlag
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bi-linear pairings and its applications. In Public Key Cryptography (PKC'04), LNCS 2947, pages 277-290. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
6
-
-
35248866917
-
An analysis of proxy signatures: Is a secure channel necessary?
-
Topics in Cryptology - CT-RSA 2003. Springer-Verlag
-
J.-Y. Lee, J. H. Cheon and S. Kim. An analysis of proxy signatures: Is a secure channel necessary? In Topics in Cryptology - CT-RSA 2003, LNCS 2612, pages. 68-79. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 68-79
-
-
Lee, J.-Y.1
Cheon, J.H.2
Kim, S.3
-
7
-
-
1642614187
-
Strong proxy Signature and its applications
-
B. Lee, H. Kim and K. Kim, Strong proxy Signature and its applications. In Proc of SCIS'01, pages. 603-08, 2001.
-
(2001)
Proc of SCIS'01
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
8
-
-
84958751721
-
Secure mobile agent using strong nondesignated proxy signature
-
Information Security and Privacy (ACISP'01). Springer-Verlag
-
B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong nondesignated proxy signature. In Information Security and Privacy (ACISP'01), LNCS 2119, pages. 474-486. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
9
-
-
0010567510
-
Proxy signatures, revisited
-
Information and Communications Security (ICICS'97). Springer-Verlag
-
S. Kim, S. Park and D. Won. Proxy Signatures, Revisited. In Information and Communications Security (ICICS'97), LNCS 1334, pages. 223-232. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
10
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep.
-
M. Mambo, K. Usuda and E. Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, No. 9, Sep., pages. 1338-1353, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
12
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
Information and Communications Security (ICICS'01), Springer-Verlag
-
H.-U. Park and I.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. In Information and Communications Security (ICICS'01), LNCS 2229, pages. 451-455, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2229
, pp. 451-455
-
-
Park, H.-U.1
Lee, I.-Y.2
|