-
2
-
-
85024290278
-
Group Signatures
-
91, D.W. Davies, ed, 547, pp
-
D. Chaum and E.v. Heyst, "Group Signatures," Proc. Advances in Cryptology (EuroCrypt '91), D.W. Davies, ed., vol. 547, pp. 257-265, 1991.
-
(1991)
Proc. Advances in Cryptology (EuroCrypt
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
3
-
-
84957354154
-
Efficient and Generalized Group Signatures
-
97, W. Fumy, ed, 1233, pp
-
J.L. Camenisch, "Efficient and Generalized Group Signatures," Proc. Advances in Cryptology (EuroCrypt '97), W. Fumy, ed., vol. 1233, pp. 465-479, 1997.
-
(1997)
Proc. Advances in Cryptology (EuroCrypt
, pp. 465-479
-
-
Camenisch, J.L.1
-
4
-
-
84958612917
-
Efficient Group Signature Schemes for Large Groups
-
97, B. Kaliski, ed, 1294, pp
-
J.L. Camenisch and M.A. Stadler, "Efficient Group Signature Schemes for Large Groups," Proc. Advances in Cryptology (Crypto '97), B. Kaliski, ed., vol. 1294, pp. 410-424, 1997.
-
(1997)
Proc. Advances in Cryptology (Crypto
, pp. 410-424
-
-
Camenisch, J.L.1
Stadler, M.A.2
-
5
-
-
49249104437
-
-
J. Herranz and G. Saez, Forking Lemmas in the Ring Signatures' Scenario, Int'l Assoc. Cryptologie Research, Technical Report 067, http://eprint.iacr.org/2003/067.ps, 2003.
-
J. Herranz and G. Saez, "Forking Lemmas in the Ring Signatures' Scenario," Int'l Assoc. Cryptologie Research, Technical Report 067, http://eprint.iacr.org/2003/067.ps, 2003.
-
-
-
-
6
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
89, G. Brassard, ed, 435, pp
-
C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards," Proc. Advances in Cryptology (Crypto '89), G. Brassard, ed., vol. 435, pp. 239-252, 1989.
-
(1989)
Proc. Advances in Cryptology (Crypto
, pp. 239-252
-
-
Schnorr, C.P.1
-
7
-
-
23944519368
-
A Ring Signature Scheme Using Bilinear Pairings
-
J. Xu, Z. Zhang, and D. Feng, "A Ring Signature Scheme Using Bilinear Pairings," Lecture Notes in Computer Science, vol. 3325, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3325
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
10
-
-
10844267480
-
An Identity-Based Proxy Ring Signature Scheme from Bilinear Pairings
-
June/July
-
W. Cheng, W. Lang, Z. Yang, G. Liu, and Y. Tan, "An Identity-Based Proxy Ring Signature Scheme from Bilinear Pairings," Proc. Ninth Int'l Symp. Computers and Comm. (ISCC '04), vol. 1, pp. 424-429, June/July 2004.
-
(2004)
Proc. Ninth Int'l Symp. Computers and Comm. (ISCC '04)
, vol.1
, pp. 424-429
-
-
Cheng, W.1
Lang, W.2
Yang, Z.3
Liu, G.4
Tan, Y.5
-
11
-
-
50049120617
-
An Identity-Based Ring Signature Scheme with Enhanced Privacy
-
Aug./Sept
-
C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, "An Identity-Based Ring Signature Scheme with Enhanced Privacy," Proc. Securecomm and Workshops, pp. 1-5, Aug./Sept. 2006.
-
(2006)
Proc. Securecomm and Workshops
, pp. 1-5
-
-
Gamage, C.1
Gras, B.2
Crispo, B.3
Tanenbaum, A.S.4
-
12
-
-
35148864786
-
Forward-Secure Traceable Ring Signature
-
July/Aug
-
C. Hu and D. Li, "Forward-Secure Traceable Ring Signature," Proc. Eighth ACIS Int'l Conf Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07), pp. 200-204, July/Aug. 2007.
-
(2007)
Proc. Eighth ACIS Int'l Conf Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07)
, pp. 200-204
-
-
Hu, C.1
Li, D.2
-
13
-
-
38949086556
-
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant
-
Nov
-
J. Li, T.H. Yuen, X. Chen, and Y. Wang, "Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant," Proc. Int'l Conf. Computational Intelligence and Security (CIS '06), vol. 2, pp. 1259-1264, Nov. 2006.
-
(2006)
Proc. Int'l Conf. Computational Intelligence and Security (CIS '06)
, vol.2
, pp. 1259-1264
-
-
Li, J.1
Yuen, T.H.2
Chen, X.3
Wang, Y.4
-
14
-
-
35148830834
-
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity
-
July/Aug
-
C. Hu and D. Li, "A New Type of Proxy Ring Signature Scheme with Revocable Anonymity," Proc. Eighth ACIS Int'l Conf Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07), vol. 1, pp. 866-868, July/Aug. 2007.
-
(2007)
Proc. Eighth ACIS Int'l Conf Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07)
, vol.1
, pp. 866-868
-
-
Hu, C.1
Li, D.2
-
16
-
-
24144445109
-
Convertible Ring Signature
-
Aug
-
K.-C. Lee, H.-A. Wen, and T. Hwang, "Convertible Ring Signature," IEE Proc.-Comm., vol. 152, no. 4, pp. 411-414, http://link.aip.org/link/?IPC/152/411/l, Aug. 2005.
-
(2005)
IEE Proc.-Comm
, vol.152
, Issue.4
, pp. 411-414
-
-
Lee, K.-C.1
Wen, H.-A.2
Hwang, T.3
-
17
-
-
0023985465
-
A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
-
Apr
-
S. Goldwasser, S. Micali, and R.L. Rivest, "A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks," SIAM J. Computing, vol. 17, no. 2, pp. 281-308, Apr. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
18
-
-
84937420077
-
Threshold Ring Signatures and Applications to Ad-Hoc Groups
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold Ring Signatures and Applications to Ad-Hoc Groups," Proc. Advances in Cryptology (CRYPTO '02), vol. 2442, pp. 465-480, 2002.
-
(2002)
Proc. Advances in Cryptology (CRYPTO '02)
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
20
-
-
38949119420
-
A Novel Id-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-Forgery
-
Nov
-
Z.Y. Wu, F. Gwo, J. Tzer, and S. Chen, "A Novel Id-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-Forgery," Proc. Int'l Conf. Computational Intelligence and Security (CIS '06), pp. 1351-1354, Nov. 2006.
-
(2006)
Proc. Int'l Conf. Computational Intelligence and Security (CIS '06)
, pp. 1351-1354
-
-
Wu, Z.Y.1
Gwo, F.2
Tzer, J.3
Chen, S.4
-
21
-
-
40249119963
-
Confessible Threshold Ring Signatures
-
Y.-S. Chen, C.-L. Lei, Y.-P. Chiu, and C.-Y. Huang, "Confessible Threshold Ring Signatures," Proc. Int'l Conf. Systems and Networks Comm. (ICSNC '06), p. 25, 2006.
-
(2006)
Proc. Int'l Conf. Systems and Networks Comm. (ICSNC '06)
, pp. 25
-
-
Chen, Y.-S.1
Lei, C.-L.2
Chiu, Y.-P.3
Huang, C.-Y.4
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
84874800178
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T.A. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.A.1
-
24
-
-
0028508211
-
Group-Oriented (t,n) Threshold Digital Signature Scheme and Digital Multisignature
-
Sept
-
L. Harn, "Group-Oriented (t,n) Threshold Digital Signature Scheme and Digital Multisignature," IEE Proc. Computers and Digital Techniques, vol. 141, no. 5, pp. 307-313, Sept. 1994.
-
(1994)
IEE Proc. Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
|