-
1
-
-
84958744427
-
1-out-of-n Signatures from a Variety of Keys
-
Proc. of Asiacrypt, Springer-Verlag
-
M. Abe, M. Ohkubo and K. Suzuki, "1-out-of-n Signatures from a Variety of Keys", Proc. of Asiacrypt 2002, LNCS, Vol.2501, pp.415-432, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
85030481487
-
How to Broadcast a Secret
-
Proc. of Eurocrypt '91, 548, pp, Springer-Verlag
-
S. Berkovits, "How to Broadcast a Secret", Proc. of Eurocrypt '91, LNCS, Vol.548, pp.535-541, Springer-Verlag, 1991.
-
(1991)
LNCS
, pp. 535-541
-
-
Berkovits, S.1
-
3
-
-
33745166648
-
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
-
Proc. of Crypto, Springer-Verlag
-
D. Boneh, C. Gentry and B. Waters, "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys", Proc. of Crypto 2005, LNCS, Vol.3621, pp.258-275, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
Proc. of Asiacrypt, Springer-Verlag
-
D. Boneh, B. Lynn and H. Shacham, "Short signatures from the Weil pairing", Proc. of Asiacrypt 2001, LNCS, Vol.2248, pp.514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Proc. of Asiacrypt '98, 1514, pp, Springer-Verlag
-
H. Cohen, A. Miyaji and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates", Proc. of Asiacrypt '98, LNCS, Vol.1514, pp.51-65, Springer-Verlag, 1998.
-
(1998)
LNCS
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
6
-
-
49049090279
-
-
R. Dutta, R. Barua and P. Sarkar, Pairing-Based Cryptographic Protocols: A Survey, Cryptology ePrint Archive, Report 2004/064, 2004.
-
R. Dutta, R. Barua and P. Sarkar, "Pairing-Based Cryptographic Protocols: A Survey", Cryptology ePrint Archive, Report 2004/064, 2004.
-
-
-
-
7
-
-
84979291225
-
Broadcast Encryption
-
Proc. of Crypto '93, 773, pp, Springer-Verlag
-
A. Fiat and M. Naor, "Broadcast Encryption", Proc. of Crypto '93, LNCS, Vol.773, pp.480-491, Springer-Verlag, 1994.
-
(1994)
LNCS
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
8
-
-
84927752554
-
Designated Verifier Proofs and their Applications
-
Proc. of Eurocrypt '96, 1070, pp, Springer-Verlag
-
M. Jakobsson, K. Sako and R. Impagliazzo, "Designated Verifier Proofs and their Applications", Proc. of Eurocrypt '96, LNCS, Vol.1070, pp.142-154, Springer-Verlag, 1996.
-
(1996)
LNCS
, pp. 142-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
9
-
-
49049119608
-
Broadcast Encryption with Sender Authentication and its Application
-
in Japanese
-
F. Kanazawa, T. Okamoto, A. Inomata and E. Okamoto, "Broadcast Encryption with Sender Authentication and its Application" (in Japanese), IPSJ J., Vol.47, No.11, pp.2992-3004, 2006.
-
(2006)
IPSJ J
, vol.47
, Issue.11
, pp. 2992-3004
-
-
Kanazawa, F.1
Okamoto, T.2
Inomata, A.3
Okamoto, E.4
-
10
-
-
35248872023
-
Extracting Group Signatures from Traitor Tracing Schemes
-
Proc. of Eurocrypt, Springer-Verlag
-
A. Kiayias and M. Yung, "Extracting Group Signatures from Traitor Tracing Schemes", Proc. of Eurocrypt 2003, LNCS, Vol.2656, pp.630-648, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 630-648
-
-
Kiayias, A.1
Yung, M.2
-
11
-
-
49049103470
-
-
3rd ed, Addison-Wesley
-
D. E. Knuth, Seminumerical Algorithms, The Art of Computer Programming, Vol.2, 3rd ed., Addison-Wesley, 1998.
-
(1998)
Seminumerical Algorithms, The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
12
-
-
32244443498
-
Efficient Algorithms for Tate Pairing
-
T. Kobayashi, K. Aoki and H. Imai, "Efficient Algorithms for Tate Pairing", IEICE Trans. Fundamentals, Vol.E89-A, No.1, pp.134-143, 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.E89-A
, Issue.1
, pp. 134-143
-
-
Kobayashi, T.1
Aoki, K.2
Imai, H.3
-
13
-
-
35048878760
-
Multi-designated Verifiers Signatures
-
Proc. of ICICS, Springer-Verlag
-
F. Laguillaumie and D. Vergnaud, "Multi-designated Verifiers Signatures", Proc. of ICICS 2004, LNCS, Vol.3269, pp.495-507, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3269
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
14
-
-
84880852861
-
Revocation and tracing schemes for stateless. receivers
-
Proc. of Crypto, Springer-Verlag
-
D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless. receivers", Proc. of Crypto 2001, LNCS, Vol.2139, pp.41-62, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
15
-
-
49049108615
-
Notes on the Broadcast Encryption with Sender Authentication (in Japanese),
-
2007-CSEC-36, pp
-
N. Ohkawa and H. Doi, "Notes on the Broadcast Encryption with Sender Authentication" (in Japanese), IPSJ SIG Technical Reports, 2007-CSEC-36, pp.31-35, 2007.
-
(2007)
IPSJ SIG Technical Reports
, pp. 31-35
-
-
Ohkawa, N.1
Doi, H.2
-
16
-
-
84946833891
-
How to Leak a Secret
-
Proc. of Asiacrypt, Springer-Verlag
-
R. L. Rivest, A. Shamir and Y. Tauman, "How to Leak a Secret", Proc. of Asiacrypt 2001, LNCS, Vol.2248, pp.552-565, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
17
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C. P. Schnorr, "Efficient Signature Generation by Smart Cards", J. Cryptology, Vol.4, No.3, pp.161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
|