-
1
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Springer-Verlag, LNCS 1431
-
F.Bao and R.H.Deng. A signcryption scheme with signature directly verifiable by public key. In PKC'98, pages 55-59. Springer-Verlag, LNCS 1431, 1998.
-
(1998)
PKC'98
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
2
-
-
1642407903
-
Efficient identity based signature schemes based on pairings
-
Lecture Notes in Computer Science. Springer-Verlag
-
F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryplography-SAC2002. Lecture Notes in Computer Science. Springer-Verlag.
-
Proceedings of 9th Workshop on Selected Areas in Cryplography-SAC2002
-
-
Hess, F.1
-
3
-
-
0037974305
-
Exponent group signature schems and efficient identity based signature schemes based on pairings
-
Report 2002/012
-
F. Hess. Exponent group signature schems and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive,Report 2002/012,2002.http://eprint.iacr.org/
-
(2002)
Cryptology EPrint Archive
-
-
Hess, F.1
-
4
-
-
4644332974
-
Signcryption schemes with forward secrecy
-
H.Y. Jung,D.H.Lee,et al. Signcryption schemes with forward secrecy. WISA 2001,vol.2, pages 403-475, 2001.
-
(2001)
WISA 2001
, vol.2
, pp. 403-475
-
-
Jung, H.Y.1
Lee, D.H.2
-
5
-
-
0010567510
-
Proxy signatures,revisited
-
LNCS 1334
-
S.Kim,S.Park,D.Won. Proxy signatures,revisited. Proc.of ICICS'97, International Conference on Information and Communications Security, LNCS 1334, pages 223-232, 1997.
-
(1997)
Proc.of ICICS'97, International Conference on Information and Communications Security
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
6
-
-
1642614187
-
Strong proxy signature and its applications
-
B.Lee,H.Kim,K.Kim. Strong proxy signature and its applications. Proc.of SCIS. pages 603-608, 2001.
-
(2001)
Proc.of SCIS
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
8
-
-
0242445175
-
Identity-based signcryption
-
Report 2002/098
-
J.Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive,Report 2002/098,http://eprint.iacr.org/
-
Cryptology EPrint Archive
-
-
Malone-Lee, J.1
-
9
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M.Mambo,K.Usuda,E.okamoto. Proxy signature: delegation of the power to sign messages. IEICE Trans.Fundamentals. E79-A:9, pages 1338-1353, 1996.
-
(1996)
IEICE Trans.Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
0029717329
-
Proxy signature for delegating signing opertion
-
M.Mambo,K.Usuda,E.okamoto. Proxy signature for delegating signing opertion. Proc. of 3rd ACM Conference on Computer and Communications Security, ACM Press New York, pages 48-57, 1996.
-
(1996)
Proc. of 3rd ACM Conference on Computer and Communications Security, ACM Press New York
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
11
-
-
33645596850
-
Signcryption scheme for identity based cryptosystems
-
Report 2003/066
-
D.Nalla,K.C.Reddy. Signcryption scheme for identity based cryptosystems. Cryptology ePrint Archive,Report 2003/066,http://eprint.iacr.org/
-
Cryptology EPrint Archive
-
-
Nalla, D.1
Reddy, K.C.2
-
12
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
38487, January
-
K.G. Paterson. ID-based signatures from pairings on elliptic curves. Electronics Letters. 38487, 1025-1020, January, 1999.
-
(1999)
Electronics Letters
, pp. 1025-11020
-
-
Paterson, K.G.1
-
13
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
volume 196 of Lecture Notes in Computer Science, Springer-Verjag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology- CRYPTO'84, volume 196 of Lecture Notes in Computer Science, pages 47-53, Springer-Verjag, 1984.
-
(1984)
Advances in Cryptology- CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
LNCS 2727
-
F.Zhang,K.Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. ACISP 2003, LNCS 2727, pages 312-323, 2003.
-
(2003)
ACISP 2003
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
15
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature & encryption)≪ cost(signature) + cost(encryption)
-
volume 1294 of Lecture Notes in Computer Science, Springer-Verlag
-
Y.Zheng. Digital signcryption or how to achieve cost(signature & encryption)≪ cost(signature) + cost(encryption). In Advances in Cryptology- CRYPTO'97, volume 1294 of Lecture Notes in Computer Science, pages 165-179,Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology- CRYPTO'97
, pp. 165-179
-
-
Zheng, Y.1
|