-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
volume 2332 of LNCS
-
Jee Hea An, Yevgeniy Dodis, and Tal Rabin. On the security of joint signature and encryption. In Advances in Cryptology - EUROCRYPT '02, volume 2332 of LNCS, pages 83-107, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT '02
, pp. 83-107
-
-
Jee Hea An1
Dodis, Y.2
Rabin, T.3
-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In Network and Distributed System Security Symposium, pages 29-43, 2005.
-
(2005)
Network and Distributed System Security Symposium
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
4
-
-
84958775356
-
Transitive signatures based on factoring and RSA
-
volume 2501 of LNCS
-
Mihir Bellare and Gregory Neven. Transitive Signatures Based on Factoring and RSA. In Advances in Cryptology - ASIACRYPT '02, volume 2501 of LNCS, pages 397-414, 2002.
-
(2002)
Advances in Cryptology - ASIACRYPT '02
, pp. 397-414
-
-
Bellare, M.1
Neven, G.2
-
6
-
-
35248880074
-
Efficient threshold signature, Multisignature, and blind signature schemes based on the gap-diffie-hellman-group signature scheme
-
volume 2567 of LNCS
-
A. Boldyreva. Efficient Threshold Signature, Multisignature, and Blind Signature Schemes based on the Gap-Diffie-Hellman-group signature Scheme. In Public Key Cryptography 2003, volume 2567 of LNCS, pages 31-46, 2003.
-
(2003)
Public Key Cryptography 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
7
-
-
0037623983
-
Identity-based encryption from the Weil Pairing
-
Dan Boneh and Matt Franklin. Identity-based encryption from the Weil Pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
35248835575
-
Aggregate and verifiably encrypted signatures
-
volume 2656 of LNCS
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of LNCS, pages 416-432, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT '03
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
9
-
-
23044435711
-
Short signatures from the Weil Pairing
-
Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil Pairing. Journal of Cryptology, 17(4):297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
volume 3152 of LNCS
-
Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology - CRYPTO 2004, volume 3152 of LNCS, pages 56-72, 2004.
-
(2004)
Advances in Cryptology - CRYPTO 2004
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
16
-
-
84946844750
-
A one-round protocol for tripartite Diffie-Hellman
-
volume 1838 of LNCS
-
Antoine Joux. A one-round protocol for tripartite Diffie-Hellman. In ANTS-IV conference, volume 1838 of LNCS, pages 385-394, 2000.
-
(2000)
ANTS-IV Conference
, pp. 385-394
-
-
Joux, A.1
-
17
-
-
33745791810
-
Security and privacy issues in e-passports
-
To appear
-
Ari Juels, David Molnar, and David Wagner. Security and privacy issues in e-passports. To appear in IEEE SecureComm, 2005.
-
(2005)
IEEE SecureComm
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
18
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundamentals, E79-A(9), 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
20
-
-
84944878224
-
Transitive signature schemes
-
volume 2271 of LNCS
-
Silvio Micali and Ronald L. Rivest. Transitive signature schemes. In CT-RSA '02, volume 2271 of LNCS, pages 236-243, 2002.
-
(2002)
CT-RSA '02
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
21
-
-
0032645111
-
Multisignature schemes secure against active insider attacks
-
K. Ohta and T. Okamoto. Multisignature schemes secure against active insider attacks. IEICE Trans. Fundamentals, E82-A/1:21-31, 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A-1
, pp. 21-31
-
-
Ohta, K.1
Okamoto, T.2
-
22
-
-
0024104968
-
A digital multisignature scheme using bijective public-key cryptosystems
-
T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems, 6(4):432-441, 1998.
-
(1998)
ACM Trans. Computer Systems
, vol.6
, Issue.4
, pp. 432-441
-
-
Okamoto, T.1
-
23
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of Cryptography, 4:161-174, 1991.
-
(1991)
Journal of Cryptography
, vol.4
, pp. 161-174
-
-
Schnorr, C.-P.1
|