메뉴 건너뛰기




Volumn 2595, Issue , 2003, Pages 310-324

Efficient identity based signature schemes based on pairings

Author keywords

Identity based signatures; Key escrow; Tate pairing; Weil pairing

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 35248867510     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36492-7_20     Document Type: Article
Times cited : (727)

References (19)
  • 2
    • 84958639277 scopus 로고    scopus 로고
    • Efficient Generation of Shared RSA Keys
    • Advances in Cryptology - CRYPTO '97, Springer-Verlag
    • D. Boneh and M. Franklin. Efficient Generation of Shared RSA Keys. In Advances in Cryptology - CRYPTO '97, Springer-Verlag LNCS 1294, 425-439, 1997.
    • (1997) LNCS , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology - CRYPTO 2001, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology - CRYPTO 2001, Springer-Verlag LNCS 2139, 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
    • D. Boneh, B. Lynn and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag LNCS 2248, 514-532, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 35248874020 scopus 로고    scopus 로고
    • An Identity-Based Signature from Gap Diffie-Hellman Groups
    • submission 2002/018
    • J. Cha and J. Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups IACR preprint server, submission 2002/018, 2002.
    • (2002) IACR Preprint Server
    • Cha, J.1    Cheon, J.2
  • 6
    • 22144433911 scopus 로고    scopus 로고
    • Split knowledge generation of RSA parameters
    • Cryptography and Coding, Springer-Verlag
    • C. Cocks. Split knowledge generation of RSA parameters. In Cryptography and Coding, Springer-Verlag LNCS 1355, 89-95, 1997.
    • (1997) LNCS , vol.1355 , pp. 89-95
    • Cocks, C.1
  • 7
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cryptography and Coding, Springer-Verlag
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, Springer-Verlag LNCS 2260, 360-363. 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 8
    • 84946832010 scopus 로고    scopus 로고
    • Supersingular curves in cryptography
    • Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
    • S. D. Galbraith. Supersingular curves in cryptography. In Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag LNCS 2248, 495-513, 2001.
    • (2001) LNCS , vol.2248 , pp. 495-513
    • Galbraith, S.D.1
  • 9
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Algorithmic Number Theory Symposium, ANTS-IV, Springer-Verlag
    • A. Joux. A one round protocol for tripartite Diffie-Hellman. In Algorithmic Number Theory Symposium, ANTS-IV, Springer-Verlag LNCS 1838, 385-394, 2000.
    • (2000) LNCS , vol.1838 , pp. 385-394
    • Joux, A.1
  • 10
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. J. Menezes, T. Okamoto and S. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Info. Th., 39, 1639-1646, 1993.
    • (1993) IEEE Trans. Info. Th. , vol.39 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.3
  • 13
    • 0002670834 scopus 로고    scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm problem
    • K. Nyberg and R. A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, 7(1/2), 61-81, 1996.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 61-81
    • Nyberg, K.1    Rueppel, R.A.2
  • 14
    • 35248860336 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • submission 2002/003
    • K. G. Paterson. ID-based signatures from pairings on elliptic curves IACR preprint server, submission 2002/003, 2002.
    • (2002) IACR Preprint Server
    • Paterson, K.G.1
  • 15
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 16
    • 35248825202 scopus 로고    scopus 로고
    • The best and worst of supersingular abelian varieties in cryptology
    • submission 2002/006
    • K. Rubin and A. Silverberg. The best and worst of supersingular abelian varieties in cryptology. IACR preprint server, submission 2002/006, 2002.
    • (2002) IACR Preprint Server
    • Rubin, K.1    Silverberg, A.2
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - CRYPTO '84, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, Springer-Verlag LNCS 196, 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.