-
1
-
-
32544436746
-
Proxy blind signature scheme
-
Awasthi A.K., and Lal S. Proxy blind signature scheme. Trans Cryptol 2 1 (2005) 5-11
-
(2005)
Trans Cryptol
, vol.2
, Issue.1
, pp. 5-11
-
-
Awasthi, A.K.1
Lal, S.2
-
2
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
Boneh D., and Franklin M.K. Identity based encryption from the Weil pairing. SIAM J Comput 32 3 (2003) 586-615
-
(2003)
SIAM J Comput
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
3
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Advances in cryptology - Eurocrypt 2004, Springer-Verlag
-
Bellare M., Namprempre C., and Neven G. Security proofs for identity-based identification and signature schemes. Advances in cryptology - Eurocrypt 2004. LNCS vol. 3027 (2004), Springer-Verlag 268-286
-
(2004)
LNCS
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
4
-
-
57849110060
-
-
Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. .
-
Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. .
-
-
-
-
5
-
-
33644688053
-
A novel efficient (t, n) threshold proxy signature scheme
-
Huanga H., and Chang C. A novel efficient (t, n) threshold proxy signature scheme. Inform Sci 176 10 (2006) 1338-1349
-
(2006)
Inform Sci
, vol.176
, Issue.10
, pp. 1338-1349
-
-
Huanga, H.1
Chang, C.2
-
6
-
-
57849084531
-
-
Hwang S, Shi C. A simple multi-proxy signature scheme. In: Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000. p. 134-8.
-
Hwang S, Shi C. A simple multi-proxy signature scheme. In: Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000. p. 134-8.
-
-
-
-
7
-
-
0010567510
-
Proxy signatures, revisited
-
Proceedings of international conference on information and communications security (ICICS)'97. Han Y., Okamoto T., and Quing S. (Eds), Springer-Verlag
-
Kim S., Park S., and Won D. Proxy signatures, revisited. In: Han Y., Okamoto T., and Quing S. (Eds). Proceedings of international conference on information and communications security (ICICS)'97. LNCS vol. 1334 (1997), Springer-Verlag 223-232
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
8
-
-
27144534222
-
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
-
Li X., and Chen K. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput (2005)
-
(2005)
Appl Math Comput
-
-
Li, X.1
Chen, K.2
-
9
-
-
13944264348
-
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
-
Proceedings of PDCAT 2004. Liew K.M., et al. (Ed), Springer-Verlag
-
Li X., Chen K., and Li S. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Liew K.M., et al. (Ed). Proceedings of PDCAT 2004. LNCS vol. 3320 (2004), Springer-Verlag 591-595
-
(2004)
LNCS
, vol.3320
, pp. 591-595
-
-
Li, X.1
Chen, K.2
Li, S.3
-
10
-
-
35248866917
-
An analysis of proxy signatures: is a secure channel necessary?
-
Topics in cryptology-CT-RSA'03. Joye M. (Ed), Springer-Verlag
-
Lee J., Cheon J., and Kim S. An analysis of proxy signatures: is a secure channel necessary?. In: Joye M. (Ed). Topics in cryptology-CT-RSA'03. LNCS vol. 2612 (2003), Springer-Verlag 68-79
-
(2003)
LNCS
, vol.2612
, pp. 68-79
-
-
Lee, J.1
Cheon, J.2
Kim, S.3
-
11
-
-
57849168672
-
-
Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: SCIS2001, vol. 2/2; January 23-26, 2001. p. 603-8.
-
Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: SCIS2001, vol. 2/2; January 23-26, 2001. p. 603-8.
-
-
-
-
12
-
-
57849138619
-
-
Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. .
-
Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. .
-
-
-
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in cryptology - crypto 84, Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes. Advances in cryptology - crypto 84. LNCS vol. 196 (1984), Springer-Verlag 47-53
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
57849169118
-
-
Wang Q, Cao Z. Security arguments for partial delegation with warrant proxy signature schemes. .
-
Wang Q, Cao Z. Security arguments for partial delegation with warrant proxy signature schemes. .
-
-
-
-
17
-
-
57849105204
-
-
Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings.
-
Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings.
-
-
-
|