-
1
-
-
0037623983
-
Identity based encryption from, the Weil pairing
-
Boneh, D., and M. Franklin (2001). Identity based encryption from, the Weil pairing. SIAM Journal of Computing, 32(3), 586-615.
-
(2001)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
35248844436
-
An identity-based signature from Gap Diffie-Hellman groups
-
PKC'03, Springer-Verlag, pp
-
Cha, J., and J.H. Cheon (2003). An identity-based signature from Gap Diffie-Hellman groups. In PKC'03, LNCS, vol. 2567. Springer-Verlag, pp. 18-30.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.1
Cheon, J.H.2
-
3
-
-
0010252194
-
Undeniable signatures
-
Springer-Verlag, pp
-
Chaum, D., and H. Van (1989). Undeniable signatures. In Crypto'1989, LNCS, vol. 435. Springer-Verlag, pp. 212-216.
-
(1989)
Crypto'1989, LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van, H.2
-
4
-
-
33646745945
-
Private Signature and Proof Systems
-
United States Patent 5,493,614
-
Chaum, D. (1996). Private Signature and Proof Systems. United States Patent 5,493,614.
-
(1996)
-
-
Chaum, D.1
-
5
-
-
33744906308
-
Short designated verifier proxy signature from, pairings
-
Security in Ubiquitous Computing Systems, SecUbiq 2005
-
Huang, X., Y. Mu, W. Susilo and F. Zhan (2005). Short designated verifier proxy signature from, pairings. In Security in Ubiquitous Computing Systems - SecUbiq 2005, LNCS, vol. 3823. pp. 835-844.
-
(2005)
LNCS
, vol.3823
, pp. 835-844
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Zhan, F.4
-
6
-
-
84927752554
-
Designated verifier proofs and their applications
-
Springer-Verlag, pp
-
Jakobsson, M., K. Sako and R. Impagliazzo (1996). Designated verifier proofs and their applications. In Eurocrypt'1996, LNCS, vol. 1070. Springer-Verlag, pp. 142-154.
-
(1996)
Eurocrypt'1996, LNCS
, vol.1070
, pp. 142-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
7
-
-
23944461971
-
Designated verifier signatures: Anonymity and efficient construction from, any bilinear map
-
Security in Communication Networks, SCN
-
Laguillaumie, F., and D. Vergnaud (2004a). Designated verifier signatures: anonymity and efficient construction from, any bilinear map. In Security in Communication Networks, SCN 2004, LNCS, vol. 3352. pp. 105-119.
-
(2004)
LNCS
, vol.3352
, pp. 105-119
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
8
-
-
35048878760
-
Multi-designated verifiers signatures
-
Information and Communications Security, ICICS
-
Laguillaumie, F., and D. Vergnaud (2004b). Multi-designated verifiers signatures. In Information and Communications Security - ICICS 2004, LNCS, vol. 3269. pp. 495-507.
-
(2004)
LNCS
, vol.3269
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
9
-
-
26644445469
-
Designated verifier signature schemes: Attacks, new security notions and a new construction
-
32nd International Colloquium on Automata, Languages and Programming, ICALP 2005
-
Lipmaa, H., G. Wang and F. Bao (2005). Designated verifier signature schemes: attacks, new security notions and a new construction. In 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, LNCS, vol. 35 80. pp. 459-471.
-
(2005)
LNCS
, vol.35
-
-
Lipmaa, H.1
Wang, G.2
Bao, F.3
-
10
-
-
84946833891
-
How to leak a secret
-
ASIACRYPT 2001
-
Rivest, R., A. Shamir and Y. Tauman (2001). How to leak a secret. In ASIACRYPT 2001, LNCS, vol. 2248. pp. 552-565.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
11
-
-
35048866464
-
An efficient strong designated verifier signature scheme
-
Springer-Verlag, pp
-
Saeednia, S., S. Kremer and O. Markowitch (2003). An efficient strong designated verifier signature scheme. In Information Security and Cryptology - ICISC 2003, Lecture Notes in Computer Science, vol. 2971. Springer-Verlag, pp. 40-54.
-
(2003)
Information Security and Cryptology - ICISC 2003, Lecture Notes in Computer Science
, vol.2971
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
-
12
-
-
85020598353
-
ID-based cryptosystems and signature schemes
-
Crypto, 196. Springer, pp
-
Shamir, A. (1985). ID-based cryptosystems and signature schemes. In Crypto 84, LNCS, vol. 196. Springer, pp. 47-53.
-
(1985)
LNCS
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
0345058957
-
Universal designated-verifier signatures
-
ASIACRYPT 2003
-
Steinfeld, R., L. Bull, H. Wang and J. Pieprzyk (2003). Universal designated-verifier signatures. In ASIACRYPT 2003, LNCS, vol. 2894. pp. 523-542.
-
(2003)
LNCS
, vol.2894
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
14
-
-
35048841170
-
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
-
PKC 2004
-
Steinfeld, R., H. Wang and J. Pieprzyk (2004). Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In PKC 2004, LNCS, vol. 2947. pp. 86-100.
-
(2004)
LNCS
, vol.2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
15
-
-
35048836270
-
Identity-based strong designated verifier signature schemes
-
Proceedings of the Information Security and Privacy, ACISP 2004, Springer, pp
-
Susilo, W., F. Zhang and Y. Mu (2004). Identity-based strong designated verifier signature schemes. In Proceedings of the Information Security and Privacy, ACISP 2004, LNCS, vol. 3108. Springer, pp. 313-324.
-
(2004)
LNCS
, vol.3108
, pp. 313-324
-
-
Susilo, W.1
Zhang, F.2
Mu, Y.3
|