-
1
-
-
0030231965
-
Proxy signature:Delegation of the power to sign messages
-
September
-
M. Mambo, K. Usuda, and E. Okamoto. Proxy signature:Delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, No.9:1338-1353, September, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
R.L. Rivest, A. Shamir and Y. Tauman. How to leak a secret. Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp.552-565, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
3
-
-
3142736051
-
A security personal learning tools using a proxy blind signature scheme
-
Illinois, USA, pp, July
-
W.D. Lin and J.K. Jan. A security personal learning tools using a proxy blind signature scheme. Proceedings of International Conference on Chinese Language Computing, Illinois, USA, pp.273-277, July 2000.
-
(2000)
Proceedings of International Conference on Chinese Language Computing
, pp. 273-277
-
-
Lin, W.D.1
Jan, J.K.2
-
4
-
-
0033875604
-
Proxy multi-signature scheme: A new type of proxy signature scheme
-
L. Yi, G. Bai and G. Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 36(6):527-528, 2000.
-
(2000)
Electronics Letters
, vol.36
, Issue.6
, pp. 527-528
-
-
Yi, L.1
Bai, G.2
Xiao, G.3
-
5
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, pp, September
-
K. Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, pp.191-197, September, 1997.
-
(1997)
1997 Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
-
6
-
-
1642614204
-
Digital proxy blind signature schemes based on DLP and ECDLP
-
Z. Tan, Z. Liu and C. Tang. Digital proxy blind signature schemes based on DLP and ECDLP. MM Research Preprints, No.21, pp.212-217, 2002.
-
(2002)
MM Research Preprints
, Issue.21
, pp. 212-217
-
-
Tan, Z.1
Liu, Z.2
Tang, C.3
-
7
-
-
35148889217
-
-
A.K. Awasthi and S. Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, available at http://eprint.iacr.org,2004.
-
A.K. Awasthi and S. Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, available at http://eprint.iacr.org,2004.
-
-
-
-
8
-
-
21144446236
-
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings
-
available at
-
F. Zhang, R.S. Naini, and C.Y Lin. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive, available at: http://eprint.iacr.org/2003/, 2003.
-
(2003)
Cryptology ePrint Archive
-
-
Zhang, F.1
Naini, R.S.2
Lin, C.Y.3
-
9
-
-
33745561884
-
Ring signatures:stronger definitions, and constructions without random oracles
-
S. Halevi and T. Rabin, editors, Theory of Cryptography ł TCC, Springer-Verlag
-
A. Bender, J. Katz, and R. Morselli. Ring signatures:stronger definitions, and constructions without random oracles. In S. Halevi and T. Rabin, editors, Theory of Cryptography ł TCC 2006, Lecture Notes in Computer Science, Springer-Verlag, vol.38762:60-79,2006.
-
(2006)
Lecture Notes in Computer Science
, vol.38762
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
10
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Moti Yung, editor, Advances in Cryptology-CRYPTO, Springer-Verlag
-
E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In Moti Yung, editor, Advances in Cryptology-CRYPTO 2002, Lecture Notes in Computer Science, Springer-Verlag, vol.2442:465-480, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
11
-
-
33745675937
-
Toward the fair anonymous signatures: Deniable ring signatures
-
D.Pointcheval, editor, CT-RSA'06, Springer-Verlag
-
Y. Komano, K. Ohta, A. Shimbo, and S. Kawamura. Toward the fair anonymous signatures: Deniable ring signatures. In D.Pointcheval, editor, CT-RSA'06, Lecture Notes in Computer Science, Springer-Verlag, vol.3860:174-191, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 174-191
-
-
Komano, Y.1
Ohta, K.2
Shimbo, A.3
Kawamura, S.4
-
12
-
-
79960836060
-
Deniable ring authentication
-
M. Naor. Deniable ring authentication. In CRYPTO 2002, pp.481-498, 2002.
-
(2002)
In CRYPTO 2002
, pp. 481-498
-
-
Naor, M.1
|