-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
Proc: Eurocrypt '02
-
J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Proc: Eurocrypt '02, LNCS 2332, 2002.
-
(2002)
LNCS 2332
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Proc. Crypto '02
-
P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Proc. Crypto '02, LNCS 2442, 2002.
-
(2002)
LNCS 2442
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. Crypto '01, See [6] for the full version
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. Crypto '01, LNCS 2139, pages 213-229, 2001. See [6] for the full version.
-
(2001)
LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short signatures from the Weil pairing
-
Proc. Asiacrypt '01
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Proc. Asiacrypt '01, LNCS 2248, pages 514-532, 2001.
-
(2001)
LNCS 2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
1142294442
-
An identity based encryption scheme based on quadratic residues
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Proc. 8th IMA Int. Conf. Cryptography and Coding, pages 26-28, 2001.
-
(2001)
Proc. 8th IMA Int. Conf. Cryptography and Coding
, pp. 26-28
-
-
Cocks, C.1
-
11
-
-
0023985465
-
A digital signature scheme secure against adap-tive chosen-message attacks
-
U. Feige, A. Fiat, and A. Shamir. A digital signature scheme secure against adap-tive chosen-message attacks. SIAM J. Computing, 17(2):281-308, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. J. Cryptology, 1:77-94, 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Proc. Crypto '86
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. Crypto '86, LNCS 263, pages 186-194, 1984.
-
(1984)
LNCS 263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
0037974305
-
Exponent group signature schemes and efficient identity based signature schemes based on pairings
-
F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology ePrint Archive, Report 2002/012
-
-
Hess, F.1
-
17
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Proc. Eurocrypt '02
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Proc. Eurocrypt '02, LNCS 2332, pages 466-481, 2002.
-
(2002)
LNCS 2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
18
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Proc. 4th Alg. Numb. Th. Symp.
-
A. Joux. A one round protocol for tripartite Diffie-Hellman. In Proc. 4th Alg. Numb. Th. Symp., LNCS 1838, pages 385-294, 2000.
-
(2000)
LNCS 1838
, pp. 385-1294
-
-
Joux, A.1
-
23
-
-
2642549675
-
Cryptosystems based on pairings
-
Okinawa, Japan
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairings. In Proc. SCIS '00, pages 26-28, Okinawa, Japan, 2000.
-
(2000)
Proc. SCIS '00
, pp. 26-28
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
24
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. Crypto '84
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. Crypto '84, LNCS 196, pages 47-53, 1984.
-
(1984)
LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
34047167609
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing. Cryptology ePrint Archive, Report 2001/111, 2001. http://eprint.iacr.org/.
-
(2001)
Cryptology ePrint Archive, Report 2001/111
-
-
Smart, N.P.1
-
26
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval J. Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13:361-396, 2000.
-
(2000)
J. Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
63449122349
-
Digital signcryption or how to achieve cost (signatured & encryption) ≪ cost (signature) + cost (encryption)
-
Proc. Crypto '97
-
Y. Zheng. Digital signcryption or how to achieve cost (signatured & encryption) ≪ cost (signature) + cost (encryption). In Proc. Crypto '97, LNCS 1294, 1997.
-
(1997)
LNCS 1294
-
-
Zheng, Y.1
|