-
3
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
EUROCRYPT 2003, Proceedings, of, Springer
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
4
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
CRYPTO 2002, Proceedings, of, Springer
-
E. Bresson. J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In CRYPTO 2002, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer. 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
5
-
-
26444540788
-
Efficient identity based ring signature
-
ACNS 2005, Proceedings, of, Springer
-
S. Chow. S. Yiu, and L. Hui. Efficient identity based ring signature. In ACNS 2005, Proceedings, volume 3531 of Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
-
-
Chow, S.1
Yiu, S.2
Hui, L.3
-
6
-
-
33845246483
-
Ring signatures without random oracles
-
ACM
-
S. M. Chow, J. K. Liu, V. K. Wei, and T. H. Yuen. Ring signatures without random oracles. In ASIA-CCS 2006, Proceedings, pages 213-229. ACM, 2006.
-
(2006)
ASIA-CCS 2006, Proceedings
, pp. 213-229
-
-
Chow, S.M.1
Liu, J.K.2
Wei, V.K.3
Yuen, T.H.4
-
7
-
-
33749398761
-
Universal designated verifier ring signature (proof) without random oracles
-
Emerging Directions in Embedded and Ubiquitous Computing 2006, Proceedings, of, Springer
-
J. Li and Y. Wang. Universal designated verifier ring signature (proof) without random oracles. In Emerging Directions in Embedded and Ubiquitous Computing 2006, Proceedings, volume 4097 of Lecture Notes in Computer Science, pages 332-341. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4097
, pp. 332-341
-
-
Li, J.1
Wang, Y.2
-
8
-
-
84946833891
-
How to leak a secret
-
ASIACRYPT 2001, Proceedings, of, Springer
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In ASIACRYPT 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
23944519368
-
A ring signature scheme using bilinear pairings
-
WISA 2004, Proceedings, of, Springer
-
J. Xu, Z. Zhang, and D. Feng. A ring signature scheme using bilinear pairings. In WISA 2004, Proceedings, volume 3325 of Lecture Notes in Computer Science, pages 163-172. Springer. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 163-172
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
10
-
-
38349022736
-
Some new proxy signature schemes from pairings
-
Progress on Cryptography: 25 years of Cryptography in China, Proceedings, of, Kluwer Academic
-
F. Zhang, R. Safavi-Naini, and C.-Y. Lin. Some new proxy signature schemes from pairings. In Progress on Cryptography: 25 years of Cryptography in China, Proceedings, volume 769 of Kluwer International Series in Engineering and Computer Science, pages 59-66. Kluwer Academic, 2004.
-
(2004)
Kluwer International Series in Engineering and Computer Science
, vol.769
, pp. 59-66
-
-
Zhang, F.1
Safavi-Naini, R.2
Lin, C.-Y.3
|