-
1
-
-
85020598353
-
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO'84, LNCS 0196, pages 47-53. Springer-Verlag, 1984.
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO'84, LNCS 0196, pages 47-53. Springer-Verlag, 1984.
-
-
-
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, LNCS 2139, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Y. Desmedt, editor, Public Key Cryptography, PKC, of, Springer-Verlag
-
J.C. Cha and J.H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In Y. Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 18-30. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
4
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
K. Nyberg and H. Heys, editors, Selected Areas in Cryptography 9th Annual International Workshop, SAC, of, Springer-Verlag
-
F. Hess. Efficient identity based signature schemes based on pairings. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, volume 2595 of LNCS, pages 310-324. Springer-Verlag, 2003.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
5
-
-
33646820668
-
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In B. Roy, editor(s), Asiacrypt 2005, LNCS 3788, pages 515-532, Springer-Verlag, 2005.
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In B. Roy, editor(s), Asiacrypt 2005, LNCS 3788, pages 515-532, Springer-Verlag, 2005.
-
-
-
-
6
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings, ACISP 03
-
Springer-Verlag
-
F. Zhang and K. Kim, Efficient ID-based blind signature and proxy signature from bilinear pairings, ACISP 03, LNCS 2727, pages 312-323, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
7
-
-
84958765355
-
ID-based blind signature and ring signature from pairings. Asiacrypt'2002
-
Springer-Verlag
-
F. Zhang, K. Kim, ID-based blind signature and ring signature from pairings. Asiacrypt'2002, LNCS 2501, pages 533-547, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
9
-
-
60349123584
-
-
S. Kim, S. Park, and D. Won, Proxy signatures, revisited, In Pro. of ICICS'97, LNCS 1334, pages 223-232, Springer-Verlag, 1997.
-
S. Kim, S. Park, and D. Won, Proxy signatures, revisited, In Pro. of ICICS'97, LNCS 1334, pages 223-232, Springer-Verlag, 1997.
-
-
-
-
10
-
-
3142736051
-
A security personal learning tools using a proxy blind signature scheme
-
Illinois, USA, July, PP
-
WD. Lin and J.K. Jan, A security personal learning tools using a proxy blind signature scheme, In Proc. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, PP. 273-277.
-
(2000)
Proc. of International Conference on Chinese Language Computing
, pp. 273-277
-
-
Lin, W.D.1
Jan, J.K.2
-
11
-
-
60349117953
-
-
Z. Tan, Z. Liu and C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, No. 21, December 2002, MMRC, AMSS, Academia, Sinica, Beijing, pp. 212-217.
-
Z. Tan, Z. Liu and C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, No. 21, December 2002, MMRC, AMSS, Academia, Sinica, Beijing, pp. 212-217.
-
-
-
-
12
-
-
14244269187
-
Proxy blind signature scheme, Cryptology ePrint Archive
-
Report 2003/072
-
S. Lal and A.K. Awasthi, Proxy blind signature scheme, Cryptology ePrint Archive, Report 2003/072.
-
-
-
Lal, S.1
Awasthi, A.K.2
-
13
-
-
26444570370
-
Provable Security of ID-based Proxy Signature Schemes
-
Proc. ICCNMC05, Springer-Verlag
-
C. Gu, Y Zhu. Provable Security of ID-based Proxy Signature Schemes. In Proc. ICCNMC05, LNCS 3619, pages 1277-1286, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3619
, pp. 1277-1286
-
-
Gu, C.1
Zhu, Y.2
-
14
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
PKC2004, Springer-Verlag
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC2004, LNCS 2947, pages 277-290. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
15
-
-
33645585449
-
ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive
-
Report 2003/054
-
R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054.
-
-
-
Sakai, R.1
Kasahara, M.2
-
16
-
-
23044517520
-
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000
-
Springer-Verlag
-
Y Sakai, K. Sakurai. Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000, LNCS 1841, pp. 59-73. Springer-Verlag 2000.
-
(2000)
LNCS
, vol.1841
, pp. 59-73
-
-
Sakai, Y.1
Sakurai, K.2
-
17
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-369,2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
60349126343
-
-
C. Gu and Y Zhu. An Efficient ID-based Proxy Signature Scheme from Pairings. Cryptology ePrint Archive, Report 2006/158, http://eprint.iacr.org/ 2006/158.
-
C. Gu and Y Zhu. An Efficient ID-based Proxy Signature Scheme from Pairings. Cryptology ePrint Archive, Report 2006/158, http://eprint.iacr.org/ 2006/158.
-
-
-
|