-
1
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attack
-
2. April
-
Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, April 1988, 17(2): 281-308.
-
(1988)
SIAM J. Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
2
-
-
84947237328
-
On the security of joint signature and encryption
-
Proc. EUROCRYPT 2002, Springer-Verlag, Amsterdam, The Netherlands
-
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In Proc. EUROCRYPT 2002, Springer-Verlag, Amsterdam, The Netherlands, LNCS 2332, 2002, pp.83-107.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
4
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Proc. EUROCRYPT04, Interlaken, Switzerland Springer-Verlag
-
Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. In Proc. EUROCRYPT04, Interlaken, Switzerland, LNCS 3027, Springer-Verlag, 2004, pp.207-222.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
5
-
-
35048887476
-
Short group signatures
-
Proc. CRYPTO 2004, Santa Barbara, California, USA
-
Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. CRYPTO 2004, Santa Barbara, California, USA, LNCS 3152, 2004, pp.41-55.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Proc. CRYPTO 2000, Santa Barbara, California, USA Springer-Verlag
-
Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme. In Proc. CRYPTO 2000, Santa Barbara, California, USA, LNCS 1880, Springer-Verlag, 2000, pp.255-270.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
7
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Proc. CRYPTO 2003, Santa Barbara, California, USA Springer-Verlag
-
Katz J, Yung M. Scalable protocols for authenticated group key exchange. In Proc. CRYPTO 2003, Santa Barbara, California, USA, LNCS 2729, Springer-Verlag, 2003 pp.110-125.
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
8
-
-
33745855807
-
Strongly unforgeable signatures based on computational Diffe-Hellman
-
New York, NY, USA, Springer-Verlag
-
Boneh D, Shen E, Waters B. Strongly unforgeable signatures based on computational Diffe-Hellman. In Proc. PKC 2006, New York, NY, USA, Springer-Verlag, 2006, pp.229-240.
-
(2006)
Proc. PKC 2006
, pp. 229-240
-
-
Boneh, D.1
Shen, E.2
Waters, B.3
-
9
-
-
84991952665
-
General conversion for obtaining strongly existentially unforgeable signatures
-
Proc. Progress in Cryptology-IN-DOCRYPT 2006, Kolkata, India, Springer-Verlag
-
Isamu Teranishi, Takuro Oyama,Wakaha Ogata. General conversion for obtaining strongly existentially unforgeable signatures. In Proc. Progress in Cryptology-IN-DOCRYPT 2006, Kolkata, India, LNCS 4329, Springer-Verlag, 2005, pp.191-205.
-
(2005)
LNCS 4329
, pp. 191-205
-
-
Teranishi, I.1
Oyama, T.2
Ogata, W.3
-
10
-
-
38049024484
-
Tow-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
-
Springer-Verlag
-
Mihir Bellare, Sarah Shoup. Tow-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. In Proc. Public Key Cryptography, PKC 2007, Beijing, China, LNCS 4450, Springer-Verlag, 2007, pp.201-216.
-
(2007)
LNCS
, vol.4450
, pp. 201-216
-
-
Bellare, M.1
Shoup, S.2
-
11
-
-
85025802492
-
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature
-
Proc. CT-RSA 2007, San Francisco, CA, USA Springer-Verlag
-
Steinfeld R, Pieprzyk J, Wang H. How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. In Proc. CT-RSA 2007, San Francisco, CA, USA, LNCS 4377, Springer-Verlag, 2007, pp.357-371.
-
(2007)
LNCS
, vol.4377
, pp. 357-371
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
12
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. CRYPTO 84, Santa Barbara, California, USA Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO 84, Santa Barbara, California, USA, LNCS 196, Springer-Verlag, 1984, pp.47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
0345490607
-
Certificateless public key cryptography
-
Proc. ASIACRYPT 2003, Taipei Springer-Verlag
-
Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, Taipei, LNCS 2894, Springer-Verlag, 2003, pp.452-473.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
15
-
-
84880883264
-
Improved online/offline signature schemes
-
Proc. CRYPTO 2001, Santa Barbara, California, USA Springer-Verlag
-
Shamir A, Tauman Y. Improved online/offline signature schemes. In Proc. CRYPTO 2001, Santa Barbara, California, USA, LNCS 2139, Springer-Verlag, 2001, pp.355-367.
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
18
-
-
84947431932
-
Better than BiBa: Short one-time signatures with fast signing and verifying
-
Proc. Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, Springer-Verlag
-
Reyzin L, Reyzin N. Better than BiBa: Short one-time signatures with fast signing and verifying. In Proc. Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, LNCS 2384, Springer-Verlag, 2002, pp.144-153.
-
(2002)
LNCS
, vol.2384
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
20
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Seattle, Washington D C, USA
-
Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In Proc. 21st ACM Symposium on the Theory of Computing, Seattle, Washington D C, USA, 1989, pp.33-43.
-
(1989)
Proc. 21st ACM Symposium on the Theory of Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
21
-
-
0003508562
-
-
National Institute of Standards and Technology (NIST) Federal Information Processing Standards Publication 186, Nov.
-
National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, Nov. 1994.
-
(1994)
Digital Signature Standard (DSS)
-
-
-
22
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, Virginia, USA
-
Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. First ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, 1993, pp.62-73.
-
(1993)
Proc. First ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
23
-
-
38049006385
-
Generic transformation to strongly unforgeable signatures
-
Proc. Applied Cryptography and Network Security, ACNS 2007, Zhuhai, China Springer-Verlag
-
Qiong Huang, Duncan S Wong, Yiming Zhao. Generic transformation to strongly unforgeable signatures. In Proc. Applied Cryptography and Network Security, ACNS 2007, Zhuhai, China, LNCS 4521, Springer-Verlag, 2007, pp.1-17.
-
(2007)
LNCS
, vol.4521
, pp. 1-17
-
-
Huang, Q.1
Wong, D.S.2
Zhao, Y.3
-
24
-
-
35048848152
-
Short signatures without random oracles
-
Proc. EUROCRYPT 2004, Interlaken, Switzerland
-
Dan Boneh, Xavier Boyen. Short signatures without random oracles. In Proc. EUROCRYPT 2004, Interlaken, Switzerland, LNCS 3027, 2004, pp.56-73.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Xavier, Boyen.2
-
25
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Proc. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia Springer-Verlag
-
Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. In Proc. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, LNCS 4058, Springer-Verlag, 2006, pp.235-246.
-
(2006)
LNCS
, vol.4058
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
26
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Springer-Verlag
-
Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes. In Proc. EUROCRYPT 2004, Springer-Verlag, 2004, pp.268-286.
-
(2004)
Proc. EUROCRYPT 2004
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
27
-
-
85024290278
-
Group signatures
-
Brighton, UK Springer-Verlag
-
Chaum D, Van Heyst E. Group signatures. In Proc. EURO-CRYPT 91, Brighton, UK, LNCS 547, Springer-Verlag, 1991, pp.257-265.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
28
-
-
84946833891
-
How to leak a secret
-
Proc. ASIACRYPT 2001, Gold Coast, Australia Springer-Verlag
-
Rivest R, Shamir A, Tauman Y. How to leak a secret. In Proc. ASIACRYPT 2001, Gold Coast, Australia, LNCS 2248, Springer-Verlag, 2001, pp.552-565.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
29
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
9
-
Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundamentals, 1996, E79-A(9): 1338-1353.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
30
-
-
0020915882
-
Blind signatures for untraceable payments
-
Santa Barbara, California, USA, Plenum Press
-
Chaum D. Blind signatures for untraceable payments. In Proc. CRYPTO 82, Santa Barbara, California, USA, Plenum Press, 1983, pp.199-203.
-
(1983)
Proc. CRYPTO 82
, pp. 199-203
-
-
Chaum, D.1
-
31
-
-
85028868533
-
Collision free hash functions and public key signature schemes.
-
Proc. EUROCRYPT87, Amsterdam, The Netherlands, Springer-Verlag
-
Damgård I. Collision free hash functions and public key signature schemes. In Proc. EUROCRYPT87, Amsterdam, The Netherlands, LNCS 304, Springer-Verlag, 1988, pp.203-216.
-
(1988)
LNCS
, vol.304
, pp. 203-216
-
-
Damgård, I.1
-
32
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
-
Proc. Fast Software Encryption 2004, Delhi, India Springer-Verlag
-
Rogaway P, Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Proc. Fast Software Encryption 2004, Delhi, India, LNCS 3017, Springer-Verlag, 2004, pp.371-388.
-
(2004)
LNCS
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
33
-
-
84864179187
-
-
Crypto++ library
-
Wei Dai. Crypto++ library. http://www.cryptopp.com/.
-
-
-
Dai, W.1
|