-
1
-
-
84946833891
-
How to Leak a Secret
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Rivest, R.L., Shamir, A.. Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248. pp. 552-556. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-556
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
85024290278
-
Group Signatures
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
3
-
-
34247385140
-
Democratic Group Signatures: On an Example of Joint Ventures
-
ACM Press, New York
-
Manulis, M.: Democratic Group Signatures: on an Example of Joint Ventures. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, p. 365. ACM Press, New York (2006)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS
, pp. 365
-
-
Manulis, M.1
-
4
-
-
79960836060
-
Deniable Ring Authentication
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481-498. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
5
-
-
33646758450
-
-
Susilo, W., Mu, Y.: Deniable Ring Authentication Revisited. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 149-163. Springer, Heidelberg (2004)
-
Susilo, W., Mu, Y.: Deniable Ring Authentication Revisited. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 149-163. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
24644461219
-
-
Wei, V.K., Tsang, P.P.: Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, 3439, pp. 48-60. Springer, Heidelberg (2005)
-
Wei, V.K., Tsang, P.P.: Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 48-60. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
33746190818
-
-
Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short Linkable Ring Signatures Revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, 4043, pp. 101-115. Springer, Heidelberg (2006)
-
Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short Linkable Ring Signatures Revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 101-115. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
84958765355
-
ID-Based Blind Signature and Ring Signature from Pairings
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533-547. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
9
-
-
54249128802
-
A Provably Secure Id-based Ring Signature Scheme. Cryptology ePrint Archive
-
Report 2003/261
-
Herranz, J., Sáez, G.: A Provably Secure Id-based Ring Signature Scheme. Cryptology ePrint Archive, Report 2003/261 (2003), http://eprint.iacr. org/
-
(2003)
-
-
Herranz, J.1
Sáez, G.2
-
10
-
-
33646532198
-
An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive
-
Report 2003/117
-
Lin, C.Y., Wu, T.C.: An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/117 (2003), http://eprint. iacr.org/
-
(2003)
-
-
Lin, C.Y.1
Wu, T.C.2
-
11
-
-
26444540788
-
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: loannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 499-512. Springer, Heidelberg (2005)
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: loannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 499-512. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
26444521603
-
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
-
Awasthi, A.K., Lal, S.: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. ArXiv Computer Science e-prints (2005), http://arxiv.org/abs/cs/0504097
-
(2005)
ArXiv Computer Science e-prints
-
-
Awasthi, A.K.1
Lal, S.2
-
13
-
-
33845272549
-
-
Au, M.H., Liu, J.K., Yuen, T.H., Wong, D.S.: Id-based Ring Signature Scheme Secure in the Standard Model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 1-16. Springer, Heidelberg (2006)
-
Au, M.H., Liu, J.K., Yuen, T.H., Wong, D.S.: Id-based Ring Signature Scheme Secure in the Standard Model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 1-16. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
40249119963
-
Confessible Threshold Ring Signatures
-
IEEE Computer Society, Los Alamitos
-
Chen, Y.S., Lei, C.L., Chiu, Y.P., Huang, C.Y.: Confessible Threshold Ring Signatures. In: International Conference on Systems and Networks Communications (ICNSC). IEEE Computer Society, Los Alamitos (2006), http://doi.ieeecomputersociety.org/10.1109/ICSNC.2006.29
-
(2006)
International Conference on Systems and Networks Communications (ICNSC)
-
-
Chen, Y.S.1
Lei, C.L.2
Chiu, Y.P.3
Huang, C.Y.4
-
15
-
-
33745675937
-
-
Komano, Y., Ohta, K., Shimbo, A., Ichi Kawamura, S.: Toward the Fair Anonymous Signatures: Deniable Ring Signatures. In: Pointcheval, D. (ed.) CT-R.SA 2006. LNCS, 3860, pp. 174-191. Springer, Heidelberg (2006)
-
Komano, Y., Ohta, K., Shimbo, A., Ichi Kawamura, S.: Toward the Fair Anonymous Signatures: Deniable Ring Signatures. In: Pointcheval, D. (ed.) CT-R.SA 2006. LNCS, vol. 3860, pp. 174-191. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
33845276753
-
-
Mu, Y., Susilo, W., Zhang, F., Wu, Q.: Ad Hoc Group Signatures. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 120-135. Springer, Heidelberg (2006)
-
Mu, Y., Susilo, W., Zhang, F., Wu, Q.: Ad Hoc Group Signatures. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 120-135. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
84957354154
-
Efficient and Generalized Group Signatures
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Camenisch, J.L.: Efficient and Generalized Group Signatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 465-479. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 465-479
-
-
Camenisch, J.L.1
-
18
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. Cryptology 13(3), 361-396 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|