-
1
-
-
85020598353
-
Identity-based cryptoSystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptoSystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248844436
-
-
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
-
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
-
-
-
-
4
-
-
35248867510
-
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 310-324. Springer, Heidelberg (2003)
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310-324. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
33646820668
-
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
6
-
-
63449088479
-
-
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, 2727, pp. 312-323. Springer, Heidelberg (2003)
-
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312-323. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Zhang, F., Kim, K.: ID-based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533-547. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
8
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM Press, New York
-
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: 3rd ACM Conference on Computer and Communications Security (CCS 1996), pp. 48-57. ACM Press, New York (1996)
-
(1996)
3rd ACM Conference on Computer and Communications Security (CCS
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
9
-
-
0010567510
-
Proxy signatures, revisited
-
Han, Y, Quing, S, eds, ICICS 1997, Springer, Heidelberg
-
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223-232. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
10
-
-
26444570370
-
Provable Security of ID-based Proxy Signature Schemes
-
Lu, X, Zhao, W, eds, ICCNMC 2005, Springer, Heidelberg
-
Gu, C., Zhu, Y.: Provable Security of ID-based Proxy Signature Schemes. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 1277-1286. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3619
, pp. 1277-1286
-
-
Gu, C.1
Zhu, Y.2
-
11
-
-
35048841300
-
Efficient Selective ID Secure Identity Based Encryption without Random Oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective ID Secure Identity Based Encryption without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
12
-
-
33645585449
-
ID based cryptoSystems with pairing on elliptic curve. Cryptology ePrint Archive
-
Report 2003/054
-
Sakai, R., Kasahara, M.: ID based cryptoSystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054
-
-
-
Sakai, R.1
Kasahara, M.2
-
13
-
-
23044517520
-
-
Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, 1841, pp. 59-73. Springer, Heidelberg (2000)
-
Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 59-73. Springer, Heidelberg (2000)
-
-
-
-
14
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-369 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
-
15
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P., Kim, H., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
16
-
-
0345490614
-
p + x + d
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
p + x + d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 111-123. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 111-123
-
-
Duursma, I.1
Lee, H.2
|