-
1
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep, pp
-
M. Mambo, K. Usuda, and E.Okamoto, "Proxy signature: Delegation of the power to sign messages", In IEICE Trans. Fundamentals, 1996, Vol. E79-A, No.9, Sep., pp. 1338-1353.
-
In IEICE Trans. Fundamentals, 1996
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
India, ACM PressNew York
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation", Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India, ACM PressNew York, 1996, pp. 48-57.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
3
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
R.L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret", Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag, 2001, pp. 552-565.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
4
-
-
64749111215
-
-
Zhang F, Naini R, and Lin C Y. New proxy signature, proxy blind signature and proxy ring signature schemes from blinear pairings [EB/OL], [2006-05-20]. http://eprint.iacr.org/ 2003/.
-
Zhang F, Naini R, and Lin C Y. "New proxy signature, proxy blind signature and proxy ring signature schemes from blinear pairings" [EB/OL], [2006-05-20]. http://eprint.iacr.org/ 2003/.
-
-
-
-
5
-
-
34547348650
-
ID-based ring signature and proxy ring signature schemes from bilinear pairings[J]
-
Amit K, Sunder L, "ID-based ring signature and proxy ring signature schemes from bilinear pairings[J]", Internal Journal of Network Security, 2007, 4(2): 187-192.
-
(2007)
Internal Journal of Network Security
, vol.4
, Issue.2
, pp. 187-192
-
-
Amit, K.1
Sunder, L.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-Crypto 2001, Springer-Verlag
-
D. Boneh, M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, 2001. pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Springer-Verlag
-
F. Zhang, K. Kim, "ID-based blind signature and ring signature from pairings," Advances in Cryptology- ASIANCRPT'02, New Zealand: Springer-Verlag, 2002. pp. 533-547.
-
(2002)
Advances in Cryptology- ASIANCRPT'02, New Zealand
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
8
-
-
84946840347
-
Short signature from the weil pairing[C]
-
Springer- Verlag
-
Boneh D, Lynn B, and Shacham H. "Short signature from the weil pairing[C]", Proe of Asiacrypt 2001,Berlin,Springer- Verlag,2001, pp. 514-532.
-
(2001)
Proe of Asiacrypt 2001,Berlin
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
26444540788
-
Efficient identity basedring ring signature
-
Applied Cryptography and Network Security, Third International Conference ACNS 2005, Proceedings
-
S. Chow, S. Yiu, and L. Hui, "Efficient identity basedring ring signature", Applied Cryptography and Network Security, Third International Conference ACNS 2005, Proceedings, LNCS 3531, pp. 499-512, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 499-512
-
-
Chow, S.1
Yiu, S.2
Hui, L.3
|