메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 347-363

Anonymous signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; DATA PRIVACY; NETWORK PROTOCOLS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 33745824908     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_23     Document Type: Conference Paper
Times cited : (34)

References (19)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Springer-Verlag, LNCS 2332
    • J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Proc. EUROCRYPT 2002, pages 83-107. Springer-Verlag, 2002. LNCS 2332.
    • (2002) Proc. EUROCRYPT 2002 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Springer-Verlag, LNCS 1976
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, pages 531-545. Springer-Verlag, 2000. LNCS 1976.
    • (2000) Proc. ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • Springer-Verlag, LNCS 1070
    • M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. In Advances in Cryptology - Eurocrypt'06, pages 399-416. Springer-Verlag, 1996. LNCS 1070.
    • (1996) Advances in Cryptology - Eurocrypt'06 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
    • Springer-Verlag, LNCS 2729
    • X. Boyen. Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In Proc. CRYPTO 2003, pages 383-399. Springer-Verlag, 2003. LNCS 2729.
    • (2003) Proc. CRYPTO 2003 , pp. 383-399
    • Boyen, X.1
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Springer-Verlag, LNCS 2045
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proc. EUROCRYPT 2001, pages 453-474. Springer-Verlag, 2001. LNCS 2045. http://eprint.iacr.org/2001/040/.
    • (2001) Proc. EUROCRYPT 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attack
    • April
    • S. Goldwasser, S. Micalr, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, 17(2):281-308, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micalr, S.2    Rivest, R.3
  • 10
    • 33745810234 scopus 로고    scopus 로고
    • The internet key exchange (IKE) protocol 〈draft-ietf-ipsec-ikev2-00.txt〉
    • November
    • D. Harkins, C. Kaufman, and R. Perlman. The internet key exchange (IKE) protocol 〈draft-ietf-ipsec-ikev2-00.txt〉. INTERNET-DRAFT, November 2001.
    • (2001) INTERNET-DRAFT
    • Harkins, D.1    Kaufman, C.2    Perlman, R.3
  • 12
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • LNCS 1070
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Proc. EUROCRYPT 96, pages 143-154, 1996. LNCS 1070.
    • (1996) Proc. EUROCRYPT 96 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 16
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Springer, LNCS 435
    • C. Schnorr. Efficient identification and signatures for smart cards. In Proc. CRYPTO 89, pages 239-252. Springer, 1990. LNCS 435.
    • (1990) Proc. CRYPTO 89 , pp. 239-252
    • Schnorr, C.1
  • 17
    • 33645964923 scopus 로고    scopus 로고
    • Analysis and improvement of a signcryption scheme with key privacy
    • Springer-Verlag, LNCS 3650
    • G. Yang, D. Wong, and X. Deng. Analysis and improvement of a signcryption scheme with key privacy. In Proc. of the 8th Information Security Conference (ISC '05), pages 218-232. Springer-Verlag, 2005. LNCS 3650.
    • (2005) Proc. of the 8th Information Security Conference (ISC '05) , pp. 218-232
    • Yang, G.1    Wong, D.2    Deng, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.