메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 189-194

Identity-based anonymous designated ring signatures

Author keywords

Ad hoc networks; Anonymity; Identity based; Peer to peer; Ring signature; Security

Indexed keywords

AD HOC NETWORKS; DATABASE SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; COMPUTER SCIENCE; NETWORK SECURITY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34247324841     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143549.1143588     Document Type: Conference Paper
Times cited : (16)

References (10)
  • 1
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n Signatures from a Variety of Keys. Advances in Cryptology - Asiacrypt 2002
    • M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. Advances in Cryptology - Asiacrypt 2002, Lecture Notes in Computer Science 2501, pages 415-432, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 2
    • 33646817427 scopus 로고    scopus 로고
    • Universal Designated Verifier Signature Proof. Advances in Cryptology - Asiacrypt 2005
    • J. Baek, R. Safavi-Naini, and W. Susilo. Universal Designated Verifier Signature Proof. Advances in Cryptology - Asiacrypt 2005, Lecture Notes in Computer Science 3788, pages 644-661, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 644-661
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 84957354154 scopus 로고    scopus 로고
    • Efficient and generalized group signatures. Advances in Cryptology - Eurocrypt '97
    • J. Camenisch. Efficient and generalized group signatures. Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science 1233, pages 465-479, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 465-479
    • Camenisch, J.1
  • 6
    • 84927752554 scopus 로고    scopus 로고
    • Designated Verifier Proofs and Their Applications. Advances in Cryptology - Eurocrypt '96
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070, pages 143-154, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 7
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret. Advances in Cryptology - Asiacrypt 2001
    • R. L. Rivest, A. Shamir, and Y. Tauman. How to Leak a Secret. Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248, pages 552-565, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 8
    • 0345058957 scopus 로고    scopus 로고
    • R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal designated-verifier signatures. Proceedings of Asiacrypt 2003, Lecture Notes in Computer Science 2894, pages 523-543, 2003.
    • R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal designated-verifier signatures. Proceedings of Asiacrypt 2003, Lecture Notes in Computer Science 2894, pages 523-543, 2003.
  • 9
    • 84958765355 scopus 로고    scopus 로고
    • ID-based Blind Signature and Ring Signature from Pairings. Advances in Cryptology Asiacrypt 2002
    • F. Zhang and K. Kim. ID-based Blind Signature and Ring Signature from Pairings. Advances in Cryptology Asiacrypt 2002, Lecture Notes in Computer Science 2501, pages 533-437, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 533-437
    • Zhang, F.1    Kim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.