-
1
-
-
85024290278
-
Group signatures
-
Workshop on the Theory and Application of of Cryptographic Techniques EUROCRYPT '91, 547, Springer
-
D. Chaum and E. van Heijst, Group signatures, Workshop on the Theory and Application of of Cryptographic Techniques (EUROCRYPT '91), LNCS, vol 547, pages 257-265, Springer, 1991.
-
(1991)
LNCS
, pp. 257-265
-
-
Chaum, D.1
van Heijst, E.2
-
2
-
-
84946833891
-
How to leak a secret
-
7th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT, Springer
-
R. L. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2001), LNCS, vol 2248,pages 552-565, Springer, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
3
-
-
3042594839
-
The Security and Privacy of Smart Vehicles
-
J.-R Hubaux, S. Capkun, and J. Luo, The Security and Privacy of Smart Vehicles, IEEE Security and Privacy Magazine, 2(3):49-55, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-R.1
Capkun, S.2
Luo, J.3
-
5
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
8th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT, Springer
-
F. Zhang and K. Kim, ID-based blind signature and ring signature from pairings, 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), LNCS, vol 2501, pages 533-547, Springer, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
6
-
-
85020598353
-
Identity-based cryptosystems and signature schemes, Advances in Cryptology (CRYPTO '84)
-
Springer
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology (CRYPTO '84), LNCS, vol 196, pages 47-53, Springer, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
7
-
-
26444540788
-
-
S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, Efficient identity based ring signature, Third International Conference in Applied Cryptography and Network Security (ACNS 2005), LNCS, 3531, pages 499-512, Springer, 2005.
-
S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, Efficient identity based ring signature, Third International Conference in Applied Cryptography and Network Security (ACNS 2005), LNCS, vol 3531, pages 499-512, Springer, 2005.
-
-
-
-
8
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin, Identity based encryption from the Weil pairing, SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
To appear in Third Theory of Cryptography Conference TCC, Springer
-
A. Bender, J. Katz, and R. Morselli, Ring signatures: Stronger definitions, and constructions without random oracles, To appear in Third Theory of Cryptography Conference (TCC 2006), LNCS, Springer, 2006.
-
(2006)
LNCS
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
10
-
-
0346265013
-
Forking lemmas for ring signature schemes
-
4th International Conference on Cryptology in India Indocrypt, Springer
-
J. Herranz and G. Sáez, Forking lemmas for ring signature schemes, 4th International Conference on Cryptology in India (Indocrypt 2003), LNCS, vol 2904, pages 266-279, Springer, 2003.
-
(2003)
LNCS
, vol.2904
, pp. 266-279
-
-
Herranz, J.1
Sáez, G.2
-
11
-
-
24944588207
-
New identity-based ring signature schemes
-
6th International Conference on Information and Communications Security ICICS, Springer
-
J. Herranz and G. Sáez, New identity-based ring signature schemes, 6th International Conference on Information and Communications Security (ICICS 2004), LNCS, vol 3269, pages 27-39, Springer, 2004.
-
(2004)
LNCS
, vol.3269
, pp. 27-39
-
-
Herranz, J.1
Sáez, G.2
-
12
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13(3):361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|