-
1
-
-
26444521603
-
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In Cryptology ePrint Archive
-
Report 2004/184
-
Amit K. Awasthi and Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In Cryptology ePrint Archive: Report 2004/184.
-
-
-
Awasthi, A.K.1
Lal, S.2
-
2
-
-
35048873387
-
Identity-Based Chameleon Hash and Applications
-
G. Ateniese and B. de Medeiros. Identity-Based Chameleon Hash and Applications. In Financial Cryptography 2004, pages 164-180.
-
(2004)
Financial Cryptography
, pp. 164-180
-
-
Ateniese, G.1
de Medeiros, B.2
-
3
-
-
84958744427
-
-
Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, LNCS 2501, pages 415-432.
-
Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, LNCS 2501, pages 415-432.
-
-
-
-
4
-
-
35248835575
-
Aggregate and Verfiably Encrypted Signatures from Bilinear Maps
-
E. Biham, ed, Proceedings of Eurocrypt of
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verfiably Encrypted Signatures from Bilinear Maps. In E. Biham, ed., Proceedings of Eurocrypt 2003, vol. 2656 of LNCS, pages 416-432.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
84937420077
-
Threshold Ring Signatures and Applications to Ad-Hoc Groups (Extended abstract)
-
Advances in Cryptology, Proceedings of CRYPTO '02
-
Emmanuel Bresson, Jacque Stern, and Michael Szydlo. Threshold Ring Signatures and Applications to Ad-Hoc Groups (Extended abstract). In Advances in Cryptology - Proceedings of CRYPTO '02, LNCS 2442, pages 465-480.
-
LNCS
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
7
-
-
84941182204
-
Efficient and Generalzied Group Sigmatures
-
Jan Camenisch. Efficient and Generalzied Group Sigmatures. In Advances in Cryptology - Eurocrypt 97, pages 465-479.
-
Advances in Cryptology - Eurocrypt
, vol.97
, pp. 465-479
-
-
Camenisch, J.1
-
8
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms
-
David Chaum. Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. In Communications of the ACM 24(2), pages 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
David Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. In Journal of Cryptology 1 (1), pages 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
10
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Yvo Desmedt, editor, Advances in Cryptology, CRYPTO '94, Berlin, Springer-Verlag
-
Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94, pages 174-187, Berlin, 1994. Springer-Verlag. Lecture Notes in Computer Science Volume 839.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
84941178131
-
-
Sherman S.M. Chow, Lucas C.K.Hui, and S.M.Yiu. Identity Based Threshold Ring Signature. In Cryptology ePrint Archive: Report 2004/179.
-
Sherman S.M. Chow, Lucas C.K.Hui, and S.M.Yiu. Identity Based Threshold Ring Signature. In Cryptology ePrint Archive: Report 2004/179.
-
-
-
-
12
-
-
85024290278
-
Group signatures
-
D.W. Davies, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science
-
David Chaum and Eugene Van Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology -Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
-
(1991)
Advances in Cryptology -Eurocrypt '91
, Issue.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
14
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
15
-
-
35048854233
-
Anonymous Identification in Ad-Hoc Groups
-
Springer-Verlag
-
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup Anonymous Identification in Ad-Hoc Groups. In em EUROCRYPT 2004, LNCS 3027, pages 609-626. Springer-Verlag, 2004.
-
(2004)
LNCS. In em EUROCRYPT 2004
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
17
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. Onion Routing for Anonymous and Private Internet Connections. In Communications of the ACM 42(2), pages 39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
18
-
-
33749987363
-
Formal Proof of Security of Zhang and Kim's ID-Based Ring Signature Scheme
-
Javier Herranz. A Formal Proof of Security of Zhang and Kim's ID-Based Ring Signature Scheme. In WOSIS 2004, pages 63-72.
-
WOSIS 2004
, pp. 63-72
-
-
Javier Herranz, A.1
-
19
-
-
84941170192
-
-
Y. Hanatani and K. Ohta. Two Stories of Ring Signatures. Crypto 2005 rump session talk. Available at http://www.iacr.org/conferences/crypto2005/r/38.ppt. A photo of the 1756 ring signature is available at http://www.nihonkoenmura.jp/theme3/takarabito07.htm.
-
Y. Hanatani and K. Ohta. Two Stories of Ring Signatures. Crypto 2005 rump session talk. Available at http://www.iacr.org/conferences/crypto2005/r/38.ppt. A photo of the 1756 "ring signature" is available at http://www.nihonkoenmura.jp/theme3/takarabito07.htm.
-
-
-
-
21
-
-
85088187688
-
Ring Signature Schemes for General Ad-Hoc Access Structures
-
J. Herranz and G. Saez. Ring Signature Schemes for General Ad-Hoc Access Structures. In Proceedings of ESAS 2004, pages 54-65.
-
Proceedings of ESAS 2004
, pp. 54-65
-
-
Herranz, J.1
Saez, G.2
-
25
-
-
84927752554
-
Designated verifier proofs and their applications
-
Ueli Maurer, editor, Advances in Cryptology, EuroCrypt '96, Berlin, Springer-Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Ueli Maurer, editor, Advances in Cryptology - EuroCrypt '96, pages 143-154, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1070.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
26
-
-
84941176979
-
Threshold Ring Signature Scheme Based on the Curve
-
Hidenori Kuwakado, Hatsukazu Tanaka. Threshold Ring Signature Scheme Based on the Curve. In IPSJ JOURNAL Abstract Vol.44, pages 8-32.
-
IPSJ JOURNAL Abstract
, vol.44
, pp. 8-32
-
-
Kuwakado, H.1
Tanaka, H.2
-
27
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Computing, 17(2):373-386, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
28
-
-
33744461779
-
Ring Authenticated Encryption: A New Type of Authenticated Encryption
-
J. Lv, K. Ren, X. Chen and K. Kim. Ring Authenticated Encryption: A New Type of Authenticated Encryption. In The 2004 Symposium on Cryptography and Information Security, vol. 1/2, pages 1179-1184.
-
The 2004 Symposium on Cryptography and Information Security
, vol.1-2
, pp. 1179-1184
-
-
Lv, J.1
Ren, K.2
Chen, X.3
Kim, K.4
-
31
-
-
35048889048
-
A Separable Threshold Ring Signature Scheme
-
ICISC 2003
-
Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. A Separable Threshold Ring Signature Scheme. In ICISC 2003, LNCS 2971, pages 12-26.
-
LNCS
, vol.2971
, pp. 12-26
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
32
-
-
35048825874
-
Linkable Spontaneous Anonymous Group Signatures for Ad Hoc Groups (Extended Abstract)
-
Springer-Verlag
-
J. K. Liu, V. K. Wei, and D. S. Wong. Linkable Spontaneous Anonymous Group Signatures for Ad Hoc Groups (Extended Abstract). In ACISP 2004, volume 3108 of LNCS, pages 325-335, Springer-Verlag, 2004.
-
(2004)
ACISP 2004, volume 3108 of LNCS
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
33
-
-
79960836060
-
Deniable Ring Authentication
-
CRYPTO 2002, Springer-Verlag
-
Moni Naor. Deniable Ring Authentication. In CRYPTO 2002, LNCS 2442, pages 481-498. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
34
-
-
1142306654
-
Digitalized signatures as intractable as factorization
-
Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, January
-
M. Rabin. Digitalized signatures as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, January 1979.
-
(1979)
-
-
Rabin, M.1
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
36
-
-
85020598353
-
-
Adi Shamir Identity Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 84, LNCS 196, pages 47-53. Springer-Verlag, 1984.
-
Adi Shamir Identity Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 84, LNCS 196, pages 47-53. Springer-Verlag, 1984.
-
-
-
-
37
-
-
84958950087
-
On monotone formula closure of SZK
-
IEEE
-
Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung. On monotone formula closure of SZK. In Proc. 35th FOCS, pages 454-465. IEEE, 1994.
-
(1994)
Proc. 35th FOCS
, pp. 454-465
-
-
Santis, A.D.1
Crescenzo, G.D.2
Persiano, G.3
Yung, M.4
-
39
-
-
33646758450
-
-
Willy Susilo and Yi Mu. Deniable Ring Authentication Revisited. In Applied Cryptography and Network Security (ACNS 2004), LNCS 3089, pages 149-163. Springer-Verlag, 2004.
-
Willy Susilo and Yi Mu. Deniable Ring Authentication Revisited. In Applied Cryptography and Network Security (ACNS 2004), LNCS 3089, pages 149-163. Springer-Verlag, 2004.
-
-
-
-
40
-
-
37149042515
-
An Improved Identity-Based Ring Signature Scheme from Bilinear Pairings
-
MMRC, AMSS, Academia, Sinica, Beijing, December
-
Chunming Tang, Zhupjun Liu, and Mingsheng Wang. An Improved Identity-Based Ring Signature Scheme from Bilinear Pairings. In NM Research Preprints, pages 231-234. MMRC, AMSS, Academia, Sinica, Beijing, No. 22, December, 2003.
-
(2003)
NM Research Preprints
, Issue.22
, pp. 231-234
-
-
Tang, C.1
Liu, Z.2
Wang, M.3
-
41
-
-
24644503853
-
Separable Linkable Threshold Ring Signatures
-
P. P. Tsang, V. K. Wei, T. K. Chan, M. H. Au, J. K. Liu, and D. S. Wong. Separable Linkable Threshold Ring Signatures. In INDOCRYPT 2004, 384-398.
-
INDOCRYPT 2004
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
42
-
-
84941192932
-
-
Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. In Cryptology ePrint Archive: Report 2004/039.
-
Victor K. Wei. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. In Cryptology ePrint Archive: Report 2004/039.
-
-
-
-
43
-
-
0142218983
-
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
-
Information and Communications Security ICICS'03, Springer-Verlag
-
Ducan S. Wong, Karyin Fung, Joseph K. Liu, and Victor K. Wei. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. In Information and Communications Security (ICICS'03), LNCS 2836, pages 34-46. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2836
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
45
-
-
84958765355
-
ID-Based Blind Signature and Ring Signature from Pairings
-
ASIACRYPT 2002, Springer-Verlag
-
Fangguo Zhang and Kwangjo Kim. ID-Based Blind Signature and Ring Signature from Pairings. In ASIACRYPT 2002, LNCS 2501, pages 533-547. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
|