메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Confessible threshold ring signatures

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 40249119963     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSNC.2006.29     Document Type: Conference Paper
Times cited : (8)

References (18)
  • 2
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In CRYPTO, pages 465-480, 2002.
    • (2002) CRYPTO , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 3
    • 33744487616 scopus 로고    scopus 로고
    • Improved ring authenticated encryption scheme
    • T. Cao, D. Lin, and R. Xue. Improved ring authenticated encryption scheme. In JICC, 2004.
    • (2004) JICC
    • Cao, T.1    Lin, D.2    Xue, R.3
  • 4
    • 33744498657 scopus 로고    scopus 로고
    • Id-based ring authenticated encryption
    • T. Cao, D. Lin, and R. Xue. Id-based ring authenticated encryption. In AINA, pages 591-596, 2005.
    • (2005) AINA , pp. 591-596
    • Cao, T.1    Lin, D.2    Xue, R.3
  • 5
    • 24944525692 scopus 로고    scopus 로고
    • Identity based threshold ring signature
    • S. S. M. Chow, L. C. K. Hui, and S.-M. Yiu. Identity based threshold ring signature. In ICISC, pages 218-232, 2004.
    • (2004) ICISC , pp. 218-232
    • Chow, S.S.M.1    Hui, L.C.K.2    Yiu, S.-M.3
  • 6
    • 0001273778 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 7
    • 0346265013 scopus 로고    scopus 로고
    • Forking lemmas for ring signature schemes
    • J. Herranz and G. Sáez. Forking lemmas for ring signature schemes. In INDOCRYPT, pages 266-279, 2003.
    • (2003) INDOCRYPT , pp. 266-279
    • Herranz, J.1    Sáez, G.2
  • 8
    • 35048814061 scopus 로고    scopus 로고
    • Distributed ring signatures for identity-based scenarios. Cryptology ePrint Archive
    • Report 2004/377
    • J. Herranz and G. Sa'ez. Distributed ring signatures for identity-based scenarios. Cryptology ePrint Archive: Report 2004/377, 2004.
    • (2004)
    • Herranz, J.1    Sa'ez, G.2
  • 9
    • 23944482531 scopus 로고    scopus 로고
    • Ring signature schemes for general ad-hoc access structures
    • J. Herranz and G. Sáez. Ring signature schemes for general ad-hoc access structures. In ESAS, pages 54-65, 2004.
    • (2004) ESAS , pp. 54-65
    • Herranz, J.1    Sáez, G.2
  • 10
    • 35048889048 scopus 로고    scopus 로고
    • A separable threshold ring signature scheme
    • J. K. Liu, V. K. Wei, and D. S. Wong. A separable threshold ring signature scheme. In ICISC, pages 12-26, 2003.
    • (2003) ICISC , pp. 12-26
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 11
    • 35048825874 scopus 로고    scopus 로고
    • Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)
    • J. K. Liu, V. K. Wei, and D. S. Wong. Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). In ACISP, pages 325-335, 2004.
    • (2004) ACISP , pp. 325-335
    • Liu, J.K.1    Wei, V.K.2    Wong, D.S.3
  • 12
    • 33744461779 scopus 로고    scopus 로고
    • Ring authenticated encryption: A new type of authenticated encryption
    • J. Lv, K. Ren, X. Chen, and K. Kim. Ring authenticated encryption: A new type of authenticated encryption. In SCIS, 2004.
    • (2004) SCIS
    • Lv, J.1    Ren, K.2    Chen, X.3    Kim, K.4
  • 13
    • 40249097762 scopus 로고    scopus 로고
    • J. Lv and X. Wong. Verifiable ring signature. In DMS, 2003.
    • J. Lv and X. Wong. Verifiable ring signature. In DMS, 2003.
  • 14
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party (extended abstract)
    • T. P. Pedersen. A threshold cryptosystem without a trusted party (extended abstract). In EUROCRYPT, pages 522-526, 1991.
    • (1991) EUROCRYPT , pp. 522-526
    • Pedersen, T.P.1
  • 16
    • 33746205204 scopus 로고    scopus 로고
    • How to leak a secret: Theory and applications of ring signatures
    • R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret: Theory and applications of ring signatures. In Essays in Memory of Shimon Even, pages 164-186, 2006.
    • (2006) Essays in Memory of Shimon Even , pp. 164-186
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 18
    • 40249096231 scopus 로고    scopus 로고
    • A new ring signature scheme with signer-admission property
    • accepted
    • C. H. Wang and C. Y. Liu. A new ring signature scheme with signer-admission property. Information Sciences (accepted)., 2006.
    • (2006) Information Sciences
    • Wang, C.H.1    Liu, C.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.