-
1
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
ICICS 2003, Springer-Verlag pp. 301-312
-
Bao F., Deng R.H., and Zhu H. Variations of Diffie-Hellman problem. ICICS 2003. LNCS 2836 (2003), Springer-Verlag pp. 301-312
-
(2003)
LNCS 2836
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology - CRYPTO'01, Springer-Verlag pp. 213-229
-
Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology - CRYPTO'01. LNCS 2139 (2001), Springer-Verlag pp. 213-229
-
(2001)
LNCS 2139
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology - ASIACRYPT'01, Springer-Verlag pp. 514-532
-
Boneh D., Lynn B., and Shacham H. Short signatures from the Weil pairing. Advances in Cryptology - ASIACRYPT'01. LNCS 2248 (2001), Springer-Verlag pp. 514-532
-
(2001)
LNCS 2248
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
0027726717
-
Random oracles are practical: a paradigm for designing efficient protocols
-
ACM Press, New York pp. 62-73
-
Bellare M., and Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proc of the 1st CCS (1993), ACM Press, New York pp. 62-73
-
(1993)
Proc of the 1st CCS
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84948970342
-
Designated confirmer signatures
-
Advances in Cryptology - EUROCRYPT'94, Springer-Verlag pp. 86-91
-
Chaum D. Designated confirmer signatures. Advances in Cryptology - EUROCRYPT'94. LNCS 950 (1994), Springer-Verlag pp. 86-91
-
(1994)
LNCS 950
-
-
Chaum, D.1
-
6
-
-
0010252194
-
Undeniable signatures
-
Advances in Cryptology - CRYPTO'89, Springer-Verlag pp. 212-216
-
Chaum D., and Antwerpen H. Undeniable signatures. Advances in Cryptology - CRYPTO'89. LNCS 435 (1989), Springer-Verlag pp. 212-216
-
(1989)
LNCS 435
-
-
Chaum, D.1
Antwerpen, H.2
-
7
-
-
84947955350
-
Cryptographically strong undeniable signatures unconditionlally secure for the signer
-
Advances in Cryptology - CRYPTO'91, Springer-Verlag pp. 470-484
-
Chaum D., Heijst E., and Pftzmann B. Cryptographically strong undeniable signatures unconditionlally secure for the signer. Advances in Cryptology - CRYPTO'91. LNCS 576 (1992), Springer-Verlag pp. 470-484
-
(1992)
LNCS 576
-
-
Chaum, D.1
Heijst, E.2
Pftzmann, B.3
-
9
-
-
33846641752
-
Optimal resilient threshold GQ signatures
-
Chu C.K., and Tzeng W.G. Optimal resilient threshold GQ signatures. Information Sciences 177 8 (2007) 1834-1851
-
(2007)
Information Sciences
, vol.177
, Issue.8
, pp. 1834-1851
-
-
Chu, C.K.1
Tzeng, W.G.2
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptively chosen message attacks
-
Goldwasser S., Micali S., and Rivest R. A digital signature scheme secure against adaptively chosen message attacks. SIAM Journal on Computing 17 2 (1988) 281-308
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
35748957655
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Advances in Cryptology - EUROCRYPT'88, Springer-Verlag pp. 216-231
-
Guillou L.S., and Quisquater J.J. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Advances in Cryptology - EUROCRYPT'88. LNCS 403 (1989), Springer-Verlag pp. 216-231
-
(1989)
LNCS 403
-
-
Guillou, L.S.1
Quisquater, J.J.2
-
12
-
-
33644688053
-
A novel efficient (t, n) threshold proxy signature scheme
-
Huang H.F., and Chang C.C. A novel efficient (t, n) threshold proxy signature scheme. Information Sciences 176 10 (2006) 1338-1349
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1338-1349
-
-
Huang, H.F.1
Chang, C.C.2
-
13
-
-
33750371530
-
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
-
Hsu C.L., Tsai K.Y., and Tsai P.L. Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Information Sciences 177 2 (2007) 543-549
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 543-549
-
-
Hsu, C.L.1
Tsai, K.Y.2
Tsai, P.L.3
-
14
-
-
34447302232
-
A directed signature scheme based on RSA assumption
-
Lu R., and Cao Z. A directed signature scheme based on RSA assumption. International Journal of Network Security 2 3 (2006) 182-186
-
(2006)
International Journal of Network Security
, vol.2
, Issue.3
, pp. 182-186
-
-
Lu, R.1
Cao, Z.2
-
15
-
-
19044376277
-
A robust (k, n) + 1 threshold proxy signature scheme based on factoring
-
Lu R., Cao Z., and Zhu H. A robust (k, n) + 1 threshold proxy signature scheme based on factoring. Applied Mathematics and Computation 166 1 (2005) 35-45
-
(2005)
Applied Mathematics and Computation
, vol.166
, Issue.1
, pp. 35-45
-
-
Lu, R.1
Cao, Z.2
Zhu, H.3
-
16
-
-
10444252573
-
Threshold undeniable signature scheme based on conic
-
Lu R., Cao Z., and Zhou Y. Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162 1 (2005) 165-177
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 165-177
-
-
Lu, R.1
Cao, Z.2
Zhou, Y.3
-
17
-
-
35748952969
-
Modified Maurer-Yacobi's scheme and its applications
-
Advances in Cryptology - AUSCRYPT'92, Springer-Verlag pp. 308-323
-
Lim C.H., and Lee P.J. Modified Maurer-Yacobi's scheme and its applications. Advances in Cryptology - AUSCRYPT'92. LNCS 718 (1992), Springer-Verlag pp. 308-323
-
(1992)
LNCS 718
-
-
Lim, C.H.1
Lee, P.J.2
-
18
-
-
33646775322
-
Universally convertible directed signatures
-
Advances in Cryptology - ASIACRYPT'05, Springer-Verlag pp. 682-701
-
Laguillaumie F., Paillier P., and Vergnaud D. Universally convertible directed signatures. Advances in Cryptology - ASIACRYPT'05. LNCS 3788 (2005), Springer-Verlag pp. 682-701
-
(2005)
LNCS 3788
-
-
Laguillaumie, F.1
Paillier, P.2
Vergnaud, D.3
-
19
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Advances in Cryptology - CRYPTO'91, Springer-Verlag pp. 129-140
-
Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology - CRYPTO'91. LNCS 576 (1992), Springer-Verlag pp. 129-140
-
(1992)
LNCS 576
-
-
Pedersen, T.1
-
20
-
-
1642489925
-
OAEP reconsidered
-
Shoup V. OAEP reconsidered. Journal of Cryptology 15 4 (2002) 223-249
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
21
-
-
35748947096
-
-
V. Shoup, Sequences of games: a tool for taming complexity in security proofs, available at: http://eprint.iacr.org/2004/332.
-
-
-
-
23
-
-
33646940989
-
A traceable threshold signature scheme with multiple signing policies
-
Shao J., and Cao Z. A traceable threshold signature scheme with multiple signing policies. Computers & Security 25 3 (2006)
-
(2006)
Computers & Security
, vol.25
, Issue.3
-
-
Shao, J.1
Cao, Z.2
-
24
-
-
33845956283
-
Simulatability and security of certificateless threshold signatures
-
Wang L., Cao Z., Li X., and Qian H. Simulatability and security of certificateless threshold signatures. Information Sciences 177 6 (2007) 1382-1394
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1382-1394
-
-
Wang, L.1
Cao, Z.2
Li, X.3
Qian, H.4
|