-
1
-
-
0027726717
-
Random oracles are practical: a paradigm for designing efficient protocols
-
Denning D., et al. (Ed), ACM
-
Bellare M., and Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Denning D., et al. (Ed). Proceedings of the 1st CCS (1993), ACM 62-73
-
(1993)
Proceedings of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
35248880074
-
Efficient threshold signature multisignature and blind signature schemes based on the ap-Diffie-Hellman-group signature scheme
-
Desmedt Y.G. (Ed), Springer-Verlag
-
Boldyreva A. Efficient threshold signature multisignature and blind signature schemes based on the ap-Diffie-Hellman-group signature scheme. In: Desmedt Y.G. (Ed). Proceedings of PKC 2003 LNCS vol. 2567 (2003), Springer-Verlag 31-46
-
(2003)
Proceedings of PKC 2003 LNCS
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
3
-
-
34648833428
-
-
A. Boldyreva, A. Palacio, B. Warinschi, Secure Proxy Signature Schemes for Delegation of Signing Rights, Cryptology ePrint Archive: Report 2003/096.
-
-
-
-
4
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham E. (Ed), Springer-Verlag
-
Boneh D., Gentry C., Lynn B., and Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham E. (Ed). Proceedings of Eurocrypt 2003, LNCS vol. 2656 (2003), Springer-Verlag 416-432
-
(2003)
Proceedings of Eurocrypt 2003, LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
84946840347
-
Short signatures from the Weil Pairiing
-
Boyd C. (Ed), Springer-Verlag
-
Boneh D., Lynn B., and Shacham H. Short signatures from the Weil Pairiing. In: Boyd C. (Ed). Proceedings of Asiacrypt 2001 LNCS vol. 2248 (2001), Springer-Verlag 514-532
-
(2001)
Proceedings of Asiacrypt 2001 LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
0023985465
-
A digital signature secure against adaptive chosen message attacks
-
Goldwasser S., Micali S., and Rivest R. A digital signature secure against adaptive chosen message attacks. SIAM Journal on Computing 17 2 (1988) 281-308
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
7
-
-
33750371530
-
Cryptanalysis and improvement of nonrepudiable threshold multiproxy multisignature scheme with shared verification
-
Hsu C., Tsai K., and Tsai P. Cryptanalysis and improvement of nonrepudiable threshold multiproxy multisignature scheme with shared verification. Information Sciences 177 2 (2007) 543-549
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 543-549
-
-
Hsu, C.1
Tsai, K.2
Tsai, P.3
-
8
-
-
33644688053
-
A novel efficient (t,n) threshold proxy signature scheme
-
Huang H., and Chang C. A novel efficient (t,n) threshold proxy signature scheme. Information Sciences 176 10 (2006) 1338-1349
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1338-1349
-
-
Huang, H.1
Chang, C.2
-
9
-
-
34648824824
-
-
J. Hwang, C.H. Chen, A new multiproxy multisignature scheme, in: National Computer Symposium: Information Security, Taiwan, 2001, pp. F019-F026.
-
-
-
-
10
-
-
31644451795
-
A simple multiproxy signature scheme
-
Hwang J., and Shi C.H. A simple multiproxy signature scheme. Communications of the CCISA 8 1 (2001) 88-92
-
(2001)
Communications of the CCISA
, vol.8
, Issue.1
, pp. 88-92
-
-
Hwang, J.1
Shi, C.H.2
-
11
-
-
0020832088
-
A public-key cryptosystem suitable for digital multisignature
-
Itakura K., and Nakamura K. A public-key cryptosystem suitable for digital multisignature. NEC Research and Development 71 10 (1983) 1-8
-
(1983)
NEC Research and Development
, vol.71
, Issue.10
, pp. 1-8
-
-
Itakura, K.1
Nakamura, K.2
-
13
-
-
0035747565
-
Accountable-subgroup multisignatures: extended abstract
-
ACM Press
-
Micali S., Ohta K., and Reyzin L. Accountable-subgroup multisignatures: extended abstract. Proceedings of CCS2001 (2001), ACM Press
-
(2001)
Proceedings of CCS2001
-
-
Micali, S.1
Ohta, K.2
Reyzin, L.3
-
14
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
15
-
-
0032645111
-
-
K. Ohta, T. Okamoto, Multi-signature scheme secure against active insider attacks, in: IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E82-A (1), 1999, pp. 21-31.
-
-
-
-
16
-
-
33751229614
-
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
-
Shim K., and Woo S. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences 177 4 (2007) 1143-1151
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1143-1151
-
-
Shim, K.1
Woo, S.2
-
17
-
-
34648824830
-
-
Z. Tan, Z. Liu, Provably Secure Delegation-by-Certification Proxy Signature Schemes, Cryptology ePrint Archive: Report 2004/148/.
-
-
-
-
18
-
-
33750585689
-
Formal model of proxy multisignature and a construction
-
Wang Q., and Cao Z. Formal model of proxy multisignature and a construction. Chinese Journal of Computers 29 9 (2006) 1628-1635
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.9
, pp. 1628-1635
-
-
Wang, Q.1
Cao, Z.2
-
19
-
-
33845956283
-
Simulatability and security of certificateless threshold signatures
-
Wang L., Cao Z., Li X., and Qian H. Simulatability and security of certificateless threshold signatures. Information Sciences 177 6 (2007) 1382-1394
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1382-1394
-
-
Wang, L.1
Cao, Z.2
Li, X.3
Qian, H.4
-
20
-
-
0033875604
-
Proxy multisignature scheme: a new type of proxy signature scheme
-
Yi L., Bai G., and Xiao G. Proxy multisignature scheme: a new type of proxy signature scheme. Electronic Letters 36 6 (2000) 527-528
-
(2000)
Electronic Letters
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
|