-
1
-
-
0036980203
-
Securing IPv6 neighbor discovery and router discovery
-
ACM Press
-
J. Arkko, T. Aura, J. Kempf, V. Mantyla, P. Nikan-der, and M. Roe, "Securing IPv6 neighbor discovery and router discovery," in Proceedings of the ACM workshop on Wireless security (WiSe 2002), ACM Press, pp. 77-86, 2002.
-
(2002)
Proceedings of the ACM workshop on Wireless security (WiSe 2002)
, pp. 77-86
-
-
Arkko, J.1
Aura, T.2
Kempf, J.3
Mantyla, V.4
Nikan-Der, P.5
Roe, M.6
-
2
-
-
33645398404
-
Identity-based chameleon hash and applications
-
Report 2003
-
G. Ateniese and B. D. Medeiros, "Identity-based chameleon hash and applications", in FC'04, Also in Cryptology ePrint Archive, Report 2003, vol. 167, 2004.
-
(2004)
FC'04, Also in Cryptology ePrint Archive
, vol.167
-
-
Ateniese, G.1
Medeiros, B.D.2
-
3
-
-
33646820668
-
Efficient and provably-Secure identity-based signatures and signcryption from bi-linear maps,
-
Springer-Verlag
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, and J. Quisquater, "Efficient and provably-Secure identity-based signatures and signcryption from bi-linear maps," in Asiacrypt'05, LNCS 3788, pp. 515-532, Springer-Verlag, 2005.
-
(2005)
Asiacrypt'05, LNCS 3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
4
-
-
50849114523
-
Fast batch ver-ification for modular exponentiation and digital sig-natures
-
Springer-Verlag
-
M. Bellare, J. Garay, and T. Robin, "Fast batch ver-ification for modular exponentiation and digital sig-natures,", in Eurocrypt'98, LNCS 1403, pp. 236-250, Springer-Verlag, 1998.
-
(1998)
Eurocrypt'98, LNCS 1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Robin, T.3
-
6
-
-
84874324906
-
Identity based encryp-tion from the Weil pairing
-
Springer-Verlag
-
D.Boneh and M. Franklin, "Identity based encryp-tion from the Weil pairing," in Crypto'01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
Crypto'01, LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short signa-ture fromWeil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn and H. Shacham, "Short signa-ture fromWeil pairing," in Asiacrypt'01, LNCS 2248, pp. 514-532, Springer-Verlag, 2003.
-
(2003)
Asiacrypt'01, LNCS 2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
35048848152
-
Short signatures without random oracles
-
Springer-Verlag
-
D. Boneh and X. Boyen, "Short signatures without random oracles", in Eurocrypt'04, LNCS 3027, pp. 56-73, Springer-Verlag, 2004.
-
(2004)
Eurocrypt'04, LNCS 3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048841300
-
Efficient selective-ID se-cure identity based encryption without random or-acles
-
Springer-Verlag
-
D. Boneh and X. Boyen, "Efficient selective-ID se-cure identity based encryption without random or-acles," in Eurocrypt'04, LNCS 3027, pp. 223-238, Springer-Verlag, 2004.
-
(2004)
Eurocrypt'04, LNCS 3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
33645601427
-
Identity based authenticated key agreement from pairings
-
Report 2002
-
L. Chen and C. Kudla, "Identity based authenticated key agreement from pairings," in Cryptology ePrint Archive, Report 2002, vol. 184, 2002.
-
(2002)
Cryptology ePrint Archive
, vol.184
-
-
Chen, L.1
Kudla, C.2
-
11
-
-
35248844436
-
An identity-based sig-nature from gap Diffie-Hellman groups
-
Springer-Verlag
-
J. C. Cha and J. H. Cheon, "An identity-based sig-nature from gap Diffie-Hellman groups," in PKC'03, LNCS 2567, pp. 18-30, Springer-Verlag, 2003.
-
(2003)
PKC'03, LNCS 2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
12
-
-
0010252194
-
Undeniable sig-natures
-
Springer-Verlag
-
D. Chaum and H. V. Antwerpen, "Undeniable sig-natures," in Crypto'89, LNCS 435, pp. 212-217, Springer-Verlag, 1989.
-
(1989)
Crypto'89, LNCS 435
, pp. 212-217
-
-
Chaum, D.1
Antwerpen, H.V.2
-
13
-
-
25844435663
-
A new ID-based group signature scheme from bilinear pairings
-
Springer-Verlag
-
X. Chen, F. Zhang, and K. Kim, "A new ID-based group signature scheme from bilinear pairings," in WISA'03, LNCS 2908, pp. 585-592, Springer-Verlag, 2003.
-
(2003)
WISA'03, LNCS 2908
, pp. 585-592
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
14
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Springer-Verlag
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Asiacrypt'02, LNCS 2501, pp. 548-566, Springer-Verlag, 2003.
-
(2003)
Asiacrypt'02, LNCS 2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
15
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer-Verlag
-
F. Hess, "Efficient identity based signature schemes based on pairings," in SAC'02, LNCS 2595, pp. 310-324, Springer-Verlag, 2003.
-
(2003)
SAC'02, LNCS 2595
, pp. 310-324
-
-
Hess, F.1
-
16
-
-
31344437951
-
Pairing-based cryptog-raphy at high security levels
-
LNCS 3796, Springer-Verlag
-
N. Koblitz and A. Meneze, "Pairing-based cryptog-raphy at high security levels," in 10th IMA Inter-national Conference on Cryptography and Coding, LNCS 3796, pp. 13-36, Springer-Verlag, 2005.
-
(2005)
10th IMA Inter-national Conference on Cryptography and Coding
, pp. 13-36
-
-
Koblitz, N.1
Meneze, A.2
-
18
-
-
23944473052
-
The exact security of an identity based signature and its applications
-
Report 2004
-
B. Libert and J. j. Quisquater, "The exact security of an identity based signature and its applications," Cryptology ePrint Archive, Report 2004, vol. 102, 2004.
-
(2004)
Cryptology ePrint Archive
, vol.102
-
-
Libert, B.1
Quisquater, J.J.2
-
19
-
-
0036475666
-
A new traitor tracing
-
S. Mitsunari, R. Sakai, and M. Kasahara, "A new traitor tracing," IEICE Transactions on Fundamen-tals, vol. E85-A, no. 2, pp. 481-484, 2002.
-
(2002)
IEICE Transactions on Fundamen-tals
, vol.E85A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
20
-
-
1642516007
-
ID-based signatures from pairings on elliptic curves
-
Re-port 2002
-
K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Cryptology ePrint Archive, Re-port 2002, vol. 003, 2002.
-
(2002)
Cryptology ePrint Archive
, vol.3
-
-
Paterson, K.G.1
-
21
-
-
34547327243
-
A comparison between traditional PKIs and identity-based cryptography
-
K. G. Paterson and G. Price, "A comparison between traditional PKIs and identity-based cryptography," Information Security Technical Report 8, pp. 57-72, 2003.
-
(2003)
Information Security Technical Report 8
, pp. 57-72
-
-
Paterson, K.G.1
Price, G.2
-
22
-
-
84927727752
-
Security proofs for sig-nature schemes
-
Springer-Verlag
-
D. Pointcheval and J. Stern, "Security proofs for sig-nature schemes," in Eurocrypt'96, LNCS 1992, pp. 387-398, Springer-Verlag, 1996.
-
(1996)
Eurocrypt'96, LNCS 1992
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
23
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Springer-Verlag
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, no. 3, pp. 361-396, Springer-Verlag, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
34548111023
-
Scaling security in pairing-based proto-cols
-
Report 2005
-
M. Scott, "Scaling security in pairing-based proto-cols," Cryptology ePrint Archive, Report 2005, vol. 139, 2005.
-
(2005)
Cryptology ePrint Archive
, vol.139
-
-
Scott, M.1
-
26
-
-
85020598353
-
Identity-based cryptosystems and sig-nature schemes
-
CA, Aug.
-
A. Shamir, "Identity-based cryptosystems and sig-nature schemes," in Crypto'84, Santa Barbara, CA, pp.47-53, Aug. 1984.
-
(1984)
Crypto'84, Santa Barbara
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
84874795542
-
-
Shamus Software Ltd. Miracl: Multiprecision in-teger and rational arithmetic C/C++ library
-
Shamus Software Ltd. Miracl: Multiprecision in-teger and rational arithmetic C/C++ library. (http://indigo.ie/~mscott/)
-
-
-
-
28
-
-
0037142442
-
A ID-based authenticated key agreement protocol based on theWeil pairings
-
N. Smart, "A ID-based authenticated key agreement protocol based on theWeil pairings," Electronics Letters, vol. 38, no. 13, pp. 630-632, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.1
-
29
-
-
0037330749
-
An identity-based signature scheme from the Weil pairing
-
X. Yi, "An identity-based signature scheme from the Weil pairing," IEEE Communications Letters, vol. 7, no. 2, pp. 76-78, 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.2
, pp. 76-78
-
-
Yi, X.1
-
30
-
-
33646238348
-
Batch verifica-tions with ID-based signatures
-
Springer-Verlag
-
H. Yoon, J. H. Cheon, and Y. Kim, "Batch verifica-tions with ID-based signatures," in ICISC'04, LNCS 3506, pp. 223-248, Springer-Verlag, 2005.
-
(2005)
ICISC'04, LNCS 3506
, pp. 223-248
-
-
Yoon, H.1
Cheon, J.H.2
Kim, Y.3
-
31
-
-
35148849257
-
ID-based chameleon hashes from bilinear pairings
-
Report 2003
-
F. Zhang, R. Safavi-Naini, and W. Susilo,"ID-based chameleon hashes from bilinear pairings," Cryptology ePrint Archive, Report 2003, vol. 208, 2003.
-
(2003)
Cryptology ePrint Archive
, vol.208
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
32
-
-
35048854587
-
An effi-cient signature scheme from bilinear pairings and its applications
-
Springer-Verlag
-
F. Zhang, R. Safavi-Naini and W. Susilo, "An effi-cient signature scheme from bilinear pairings and its applications," in PKC'04, LNCS 2947, pp. 277-290, Springer-Verlag, 2004.
-
(2004)
PKC'04, LNCS 2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
33
-
-
77951143073
-
A new short signature scheme without random oracles from bilinear pairings
-
F. Zhang, X. Chen, W. Susilo, and Y. Mu, "A new short signature scheme without random oracles from bilinear pairings," Cryptology ePrint Archive, Re-port'2005, vol. 386, 2005
-
(2005)
Cryptology ePrint Archive, Report'2005
, vol.386
-
-
Zhang, F.1
Chen, X.2
Susilo, W.3
Mu, Y.4
|