메뉴 건너뛰기




Volumn 5229 LNCS, Issue , 2008, Pages 201-217

Anonymous proxy signatures

Author keywords

[No Author keywords available]

Indexed keywords

STANDARDS;

EID: 52149107370     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85855-3_14     Document Type: Conference Paper
Times cited : (42)

References (18)
  • 1
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 2
    • 24144477851 scopus 로고    scopus 로고
    • Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 136-153. Springer, Heidelberg (2005)
    • Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136-153. Springer, Heidelberg (2005)
  • 4
    • 11244339991 scopus 로고    scopus 로고
    • Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive
    • Report 2003/096
    • Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive: Report 2003/096 (2003)
    • (2003)
    • Boldyreva, A.1    Palacio, A.2    Warinschi, B.3
  • 5
    • 37149007674 scopus 로고    scopus 로고
    • Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 1-15. Springer, Heidelberg (2007)
    • Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
  • 6
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 10
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 12
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 13
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 14
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM, New York
    • Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: 22nd Annual Symposium on Theory of Computing, pp. 387-394. ACM, New York (1990)
    • (1990) 22nd Annual Symposium on Theory of Computing , pp. 387-394
    • Rompel, J.1
  • 15
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • IEEE, Los Alamitos
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Symposium on Foundations of Computer Science, pp. 543-553. IEEE, Los Alamitos (1999)
    • (1999) 40th Symposium on Foundations of Computer Science , pp. 543-553
    • Sahai, A.1
  • 17
    • 52149105240 scopus 로고    scopus 로고
    • Provably secure delegation-by-certification proxy signature schemes. IACR ePrint Archive
    • Report 2004/148
    • Tan, Z., Liu, Z.: Provably secure delegation-by-certification proxy signature schemes. IACR ePrint Archive: Report 2004/148 (2004)
    • (2004)
    • Tan, Z.1    Liu, Z.2
  • 18
    • 26444526650 scopus 로고    scopus 로고
    • Hierarchical group signatures
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Trolin, M., Wikström, D.: Hierarchical group signatures. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 446-458. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 446-458
    • Trolin, M.1    Wikström, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.