-
1
-
-
26444540788
-
Efficient identity based ring signature
-
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings
-
S. Chow, S. Yiu, and L. Hui, "Efficient identity based ring signature," Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, LNCS 3531, pp. 499-512, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 499-512
-
-
Chow, S.1
Yiu, S.2
Hui, L.3
-
2
-
-
33845246483
-
Ring signatures without random oracles
-
S. Chow, K. Liu, K. Wei, and T. Yuen, "Ring signatures without random oracles," Proceedings of AsicCCS 2006, pp. 297-302, 2006.
-
(2006)
Proceedings of AsicCCS 2006
, pp. 297-302
-
-
Chow, S.1
Liu, K.2
Wei, K.3
Yuen, T.4
-
3
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Advances in Cryptology, CRYPTO 2002
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups," Advances in Cryptology - CRYPTO 2002, LNCS 2442, pp. 465-480, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
4
-
-
34548123791
-
Forking lemmas for ring signature schemes,Indocrypt'03
-
J. Herranz, and G. Saez, "Forking lemmas for ring signature schemes,"Indocrypt'03, LNCS 1403, pp. 406-421. 2003.
-
(2003)
LNCS
, vol.1403
, pp. 406-421
-
-
Herranz, J.1
Saez, G.2
-
5
-
-
84927752554
-
Designated verifier proofs and their applications, Advances in Cryptology - EUROCRYPT '96
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology - EUROCRYPT '96, LNCS 1070, pp. 143-154, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-Crypto 2001, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology-Crypto 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
New Zealand: Springer-Verlag
-
F. Zhang and K. Kim, "ID-based blind signature and ring signature from pairings," Advances in Cryptology - ASIACRPT'02, pp. 533-547, New Zealand: Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - ASIACRPT'02
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
8
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology, ASIACRYPT 2001
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pp. 257-265, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 257-265
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
35048866464
-
An effcient strong designated verifier signature scheme, Information Security and Cryptology-ICISC03
-
S. Saeednia, S. Kremer, and O. Markowitch, "An effcient strong designated verifier signature scheme," Information Security and Cryptology-ICISC03, LNCS 2971, pp. 40-54, 2003.
-
(2003)
LNCS
, vol.2971
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
-
11
-
-
84948973239
-
Message recovery for signature schemes based on the discrete logarithm problem, Advances in Cryptology-EUROCRYPT'94
-
K. Nyberg, and R. A. Rueppel, "Message recovery for signature schemes based on the discrete logarithm problem," Advances in Cryptology-EUROCRYPT'94. LNCS 950, pp. 182-193, 1994.
-
(1994)
LNCS
, vol.950
, pp. 182-193
-
-
Nyberg, K.1
Rueppel, R.A.2
|