-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + Cost (encryption)
-
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + Cost (encryption)[C]// Proc Advances in Cryptology-CRYPTO'97, LNCS 1294, 1997: 165-179.
-
(1997)
Proc Advances in Cryptology-CRYPTO'97, LNCS 1294
, pp. 165-179
-
-
Zheng, Y.1
-
4
-
-
84946833891
-
How to leak a secret
-
Berlin: Springer-Verlag
-
Rivest R L, Shamir A, Tauman Y. How to leak a secret [C]// Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Berlin: Springer-Verlag, 2001: 552-565.
-
(2001)
Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
5
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Berlin: Springer-Verlag
-
Zhang F, Kim K. ID-based blind signature and ring signature from pairings [C]// Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer-Verlag, 2002: 533-547.
-
(2002)
Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
6
-
-
33744502401
-
Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
-
New York: IEEE Computer Society Press
-
Huang X, Susilo W, Mu Y, Zhang F. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world [C]// Proc Advanced Information Networking and Applications-AINA 2005, New York: IEEE Computer Society Press, 2005: 649-654.
-
(2005)
Proc Advanced Information Networking and Applications-AINA 2005
, pp. 649-654
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
7
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
Berlin: Springer-Verlag
-
Zhang M, Yang B, Zhu S, et al. Efficient secret authenticatable anonymous signcryption scheme with identity privacy [C]//Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075. Berlin: Springer-Verlag, 2008: 126-137.
-
(2008)
Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075
, pp. 126-137
-
-
Zhang, M.1
Yang, B.2
Zhu, S.3
-
8
-
-
84947237328
-
On the security of joint signature and encryption
-
Berlin: Springer-Verlag
-
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption [C]// Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, Berlin: Springer-Verlag, 2002: 83-107.
-
(2002)
Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
9
-
-
57949083511
-
Analysis and improvement of authenticatable ring signcryption scheme
-
Li F, Shirase M, Takagi T. Analysis and improvement of authenticatable ring signcryption scheme [EB/OL]. http://eprint.iacr.org/2008/373.pdf, 2008.
-
(2008)
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
|