-
1
-
-
84937428623
-
Efficient algorithms for pairingbased cryptosystems
-
Springer-Verlag
-
P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott, Efficient algorithms for pairingbased cryptosystems, Advances in Cryptology-Crypto 2002, LNCS 2442, pp.354-368, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-Crypto 2002, LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
2
-
-
35248880074
-
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman -group signature scheme
-
Springer-Verlag
-
A. Boldyreva, Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman -group signature scheme, Public Key Cryptography - PKC 2003, LNCS 2139, pp.31-46, Springer-Verlag, 2003.
-
(2003)
Public Key Cryptography - PKC 2003, LNCS
, vol.2139
, pp. 31-46
-
-
Boldyreva, A.1
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
-
(2001)
Dvances in Cryptology-Crypto 2001, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
In C. Boyd, editor, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-Asiacrypt 2001, LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Springer-Verlag
-
J.C. Cha and J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups, Public Key Cryptography - PKC 2003, LNCS 2139, pp.18-30, Springer- Verlag, 2003.
-
(2003)
Public Key Cryptography - PKC 2003, LNCS
, vol.2139
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
6
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum, NY
-
D. Chaum, Blind signatures for untraceable payments, Advances in Cryptology- Crypto 82, Plenum, NY, pp.199-203, 1983.
-
(1983)
Advances in Cryptology- Crypto 82
, pp. 199-203
-
-
Chaum, D.1
-
7
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey and H. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Mathematics of Computation, 62, pp.865-874, 1994.
-
(1994)
Mathematics of Computation
, vol.62
, pp. 865-874
-
-
Frey, G.1
Rück, H.2
-
8
-
-
82955246861
-
Implementing the Tate pairing
-
Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, ANTS 2002, LNCS 2369, pp.324-337, Springer-Verlag, 2002.
-
(2002)
ANTS 2002, LNCS
, vol.2329
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
9
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Springer-Verlag
-
C. Gentry and A. Silverberg, Hierarchical ID-based cryptography, Proc. of Asiacrpt2002, LNCS 2501, pp. 548-566, Springer-Verlag, 2002.
-
(2002)
Proc. Of Asiacrpt2002, LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
10
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer-Verlag
-
F. Hess, Efficient identity based signature schemes based on pairings, SAC 2002, LNCS 2595, pp.310-324, Springer-Verlag, 2002.
-
(2002)
SAC 2002, LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
11
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Springer-Verlag
-
A. Joux, A one round protocol for tripartite Diffie-Hellman, ANTS IV, LNCS 1838, pp.385-394, Springer-Verlag, 2000.
-
(2000)
ANTS IV, LNCS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
12
-
-
84958591696
-
Security of blind digital signatures
-
Springer-Verlag
-
A. Juels, M. Luby and R. Ostrovsky, Security of blind digital signatures, Advances in Cryptology-Crypto 97, LNCS 1294, pp.150-164, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology-Crypto 97, LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
13
-
-
0010567510
-
Proxy signatures, revisited
-
Springer-Verlag
-
S. Kim, S. Park, and D. Won, Proxy signatures, revisited, In Pro. of ICICS 97, LNCS 1334, Springer-Verlag, pp. 223-232, 1997.
-
(1997)
Pro. Of ICICS 97, LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
14
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Springer Verlag
-
B. Lee, H. Kim and K. Kim, Secure mobile agent using strong non-designated proxy signature, Proc. of ACISP2001, LNCS 2119, pp.474-486, Springer Verlag, 2001.
-
(2001)
Proc. Of ACISP2001, LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
15
-
-
35248866917
-
An analysis of proxy signatures: Is a secure channel necessary?
-
Springer-Verlag
-
J.Y. Lee, J.H. Cheon and S. Kim, An analysis of proxy signatures: Is a secure channel necessary?, CT-RSA 2003, LNCS 2612, pp. 68-79, Springer-Verlag, 2003.
-
(2003)
CT-RSA 2003, LNCS
, vol.2612
, pp. 68-79
-
-
Lee, J.Y.1
Cheon, J.H.2
Kim, S.3
-
16
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signature: Delegation of the power to sign messages, In IEICE Trans. Fundamentals, Vol. E79-A, No. 9, Sep., pp. 1338-1353, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transaction on Information Theory, Vol.39, pp.1639-1646, 1993.
-
(1993)
IEEE Transaction on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
19
-
-
84948137719
-
Extended proxy signatures for smart cards
-
Springer-Verlag
-
T. Okamoto, M. Tada and E. Okamoto, Extended proxy signatures for smart cards, ISW’99, LNCS 1729, Springer-Verlag, pp. 247-258, 1999.
-
(1999)
ISW’99, LNCS
, vol.1729
, pp. 247-258
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
20
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K.G. Paterson, ID-based signatures from pairings on elliptic curves, Electron. Lett., Vol.38, No.18, pp.1025-1026, 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
21
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, Vol.13, No.3, pp.361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
1642378913
-
-
Jan, Okinawa, Japan
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, SCIS 2000- C20, Jan. 2000, Okinawa, Japan.
-
(2000)
Cryptosystems Based on Pairing
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
23
-
-
84957026429
-
Security of blind discrete log signatures against interactive attacks
-
Springer-Verlag
-
C. P. Schnorr, Security of blind discrete log signatures against interactive attacks, ICICS 2001, LNCS 2229, pp. 1-12, Springer-Verlag, 2001.
-
(2001)
ICICS 2001, LNCS
, vol.2229
, pp. 1-12
-
-
Schnorr, C.P.1
-
24
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pp.47-53, Springer-Verlag, 1984.
-
(1984)
Advances in Cryptology-Crypto 84, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart, An identity based authenticated key agreement protocol based on the Weil pairing, Electron. Lett., Vol.38, No.13, pp.630-632, 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
26
-
-
84937428040
-
A generalized birthday problem
-
Springer-Verlag
-
D. Wagner, A generalized birthday problem, Advances in Cryptology-Crypto 2002, LNCS 2442, pp.288-303, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-Crypto 2002, LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
27
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Springer-Verlag
-
F. Zhang and K. Kim, ID-based blind signature and ring signature from pairings, Proc. of Asiacrpt 2002, LNCS 2501, pp. 533-547, Springer-Verlag, 2002.
-
(2002)
Proc. Of Asiacrpt 2002, LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
28
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, Sep
-
K. Zhang, Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, Sep., 1997, pp.191-197.
-
(1997)
1997 Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
|