-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO'84. Springer-Verlag, Berlin Heidelberg New York
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology - CRYPTO'84. Lecture Notes in Computer Science, Vol. 196. Springer-Verlag, Berlin Heidelberg New York (1984) 47-53.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology- CRYPTO 2001. Springer-Verlag, Berlin Heidelberg New York
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology- CRYPTO 2001. Lecture Notes in Computer Science, Vol. 2139. Springer-Verlag, Berlin Heidelberg New York (2001) 213-229.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002. Springer-Verlag, Berlin Heidelberg New York
-
Hess, P.: Efficient identity based signature schemes based on pairings. In: Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002. Lecture Notes in Computer Science, Vol. 2595. Springer-Verlag, Berlin Heidelberg New York (2003) 310-324.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, P.1
-
4
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Public Key Cryptography - PKC 2003. Springer-Verlag, Berlin Heidelberg New York
-
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography - PKC 2003. Lecture Notes in Computer Science, Vol. 2567. Springer-Verlag, Berlin Heidelberg New York (2003) 18-30.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
5
-
-
0037330749
-
An identity-based signature scheme from the Weil pairing
-
Yi,X.: An identity-based signature scheme from the Weil pairing. In: IEEE Communications Letters 7(2)(2003), pp. 76-78.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.2
, pp. 76-78
-
-
Yi, X.1
-
6
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
Paterson, K.G.: ID-Based Signatures from Pairings on Elliptic Curves. In: Electron. Lett., Vol.38, No.18, 2002, pp.1025-1026.
-
(2002)
Electron. Lett.
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
7
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
ACISP 03. Springer-Verlag, Berlin Heidelberg New York
-
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: ACISP 03. Lecture Notes in Computer Science, Vol. 2727. Springer-Verlag, Berlin Heidelberg New York (2003) 312-323.
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
8
-
-
26444570370
-
Provable security of ID-baaed proxy signature schemes
-
Proc. 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05). Springer-Verlag, Berlin Heidelberg New York
-
Gu, C.X., Zhu, Y.F.: Provable Security of ID-baaed Proxy Signature Schemes. In: Proc. 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05). Lecture Notes in Computer Science, Vol. 3619. Springer-Verlag, Berlin Heidelberg New York (2005) 1277-1286.
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 1277-1286
-
-
Gu, C.X.1
Zhu, Y.F.2
-
9
-
-
84957616594
-
Optimistic fair exchange of signatures
-
Advances in Cryptology - EUROCRYPT 1998. Springer-Verlag, Berlin Heidelberg New York
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of signatures. In: Advances in Cryptology - EUROCRYPT 1998. Lecture Notes in Computer Science vol. 1403. Springer-Verlag, Berlin Heidelberg New York (1998) 591-606.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
10
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Advances in Cryptology - CRYPTO 2003. Springer-Verlag, Berlin Heidelberg New York
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science vol. 2729. Springer-Verlag, Berlin Heidelberg New York (2003) 195-211.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 195-211
-
-
Camenisch, J.1
Shoup, V.2
-
11
-
-
84948969076
-
Fair encryption of RSA keys
-
Proc. of Eurocrypt 2000. Springer-Verlag, Berlin Heidelberg New York
-
Poupard, G., Stern, J.: Fair encryption of RSA keys. In: Proc. of Eurocrypt 2000, Lecture Notes in Computer Science vol. 1807. Springer-Verlag, Berlin Heidelberg New York (2000) 172-189.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 172-189
-
-
Poupard, G.1
Stern, J.2
-
12
-
-
21144441197
-
Aggregate and verifiably encrypted signature from bilinear maps
-
Eurocrypt 2003. Springer-Verlag, Berlin Heidelberg New York
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signature from Bilinear Maps. In: Eurocrypt 2003. Lecture Notes in Computer Science, Vol. 2248. Springer-Verlag, Berlin Heidelberg New York (2003) 514-532.
-
(2003)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
13
-
-
33744931858
-
A scheme of fair exchange of signatures based on bilinear aggregate signatures
-
Dec.
-
Li, M.D., Yang, Y.X., Ma, C.G., Cai, M.C.: A scheme of fair exchange of signatures based on bilinear aggregate signatures. In: Journal of China Institute of Communications, 25(12):59-64. Dec. 2005.
-
(2005)
Journal of China Institute of Communications
, vol.25
, Issue.12
, pp. 59-64
-
-
Li, M.D.1
Yang, Y.X.2
Ma, C.G.3
Cai, M.C.4
-
15
-
-
3042591057
-
An RSA-based security protocol for certified E-goods delivery
-
ITCC 2004, Las Vegas, USA, IEEE Computer Society
-
Nenadic, A., Zhang, N., Cheetham, B., Goble, C.: An RSA-based Security Protocol for Certified E-goods Delivery. In: Proc. IEEE International Conference on Information Technology, ITCC 2004, Las Vegas, USA, IEEE Computer Society (2004), 22-28.
-
(2004)
Proc. IEEE International Conference on Information Technology
, pp. 22-28
-
-
Nenadic, A.1
Zhang, N.2
Cheetham, B.3
Goble, C.4
-
16
-
-
3142585398
-
Verifiable encryption of digital signatures and applications
-
February
-
Ateniese, G.: Verifiable Encryption of Digital Signatures and Applications. In: ACM Transactions on Information and System Security, Vol. 7, No. 1, February 2004, Pages 1C20.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
-
-
Ateniese, G.1
-
17
-
-
23044517520
-
Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance
-
ACISP 2000. Springer-Verlag, Berlin Heidelberg New York
-
Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: ACISP 2000. Lecture Notes in Computer Science, Vol. 1841. Springer-Verlag, Berlin Heidelberg New York (2000) 59-73.
-
(2000)
Lecture Notes in Computer Science
, vol.1841
, pp. 59-73
-
-
Sakai, Y.1
Sakurai, K.2
|