-
2
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in: Crypto'01, LNCS 2139, Springer-Verlag, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
24944525692
-
Identity based threshold ring signature
-
Springer-Verlag
-
S. S.M. Chow, L. C. K. Hui, and S.M. Yiu, Identity Based Threshold Ring Signature, in: Proc. International Conference on Information Security and Cryptology - ICISC 2004, LNCS 3506, Springer-Verlag, 2004, pp. 218-232.
-
(2004)
Proc. International Conference on Information Security and Cryptology - ICISC 2004, LNCS 3506
, pp. 218-232
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
-
4
-
-
26444540788
-
Efficient identity based ring signature
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
S. S.M. Chow, S.M. Yiu, and L. C.K. Hui, Efficient Identity Based Ring Signature, in: Proc. Applied Cryptography and Network Security ! ACNS, LNCS 3531, Springer-Verlag, 2005, pp. 499-512. (Pubitemid 41422135)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
5
-
-
0346265013
-
Forking lemmas for ring signature schemes
-
Springer-Verlag
-
J. Herranz and G. Saez, Forking lemmas for ring signature schemes, in: Indocrypt'03, LNCS2904, Springer-Verlag, 2003, pp. 266-279.
-
(2003)
Indocrypt'03, LNCS2904
, pp. 266-279
-
-
Herranz, J.1
Saez, G.2
-
6
-
-
24944588207
-
New identity-based ring signature schemes
-
J. Herranz and G. Saez, New Identity-Based Ring Signature Schemes, in: Information and Communications Security, ICICS 2004, LNCS 3269, Springer-Verlag, 2004, pages 27~39. (Pubitemid 39737127)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3269
, pp. 27-39
-
-
Herranz, J.1
Saez, G.2
-
8
-
-
0036475666
-
A new traitor tracing
-
S. Mitsunari, R. Sakai and M. Kasahara, A new traitor tracing, IEICE Trans. Fundamentals, E85-A(2) (2002) 481~484. (Pubitemid 34292433)
-
(2002)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
9
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology 13(3) (2000) 361-396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
10
-
-
84946833891
-
Howto leak a secret
-
Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman, Howto Leak a Secret, in: Proc. Asiacrypt'01, LNCS 2248, Springer-Verlag, 2001, pp. 552-565.
-
(2001)
Proc Asiacrypt'01, LNCS 2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
11
-
-
85020598353
-
Identity based on cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir, Identity based on cryptosystems and signature schemes, in:Crypto'84, LNCS 196, Springer-Verlag, 1984, pp. 47-53.
-
(1984)
Crypto'84, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
84958765355
-
ID-Based Blind Signature and Ring Signature from Pairings
-
Springer-Verlag
-
F. Zhang and K. Kim, ID-Based Blind Signature and Ring Signature from Pairings, in: Proc. Asiacrypt'02, LNCS 2501, Springer-Verlag, 2002, pp. 533-547.
-
(2002)
Proc. Asiacrypt'02, LNCS 2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
13
-
-
33750713612
-
A new ring signature scheme with signer-admission property
-
DOI 10.1016/j.ins.2006.03.016, PII S0020025506000636
-
C. H. Wang and C. Y. Liu, A new ring signature scheme with signer-admission property, Information Sciences 177(3) (2007) 747-754. (Pubitemid 44708131)
-
(2007)
Information Sciences
, vol.177
, Issue.3
, pp. 747-754
-
-
Wang, C.-H.1
Liu, C.-Y.2
|