-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS196
-
Shamir A. Identity-based cryptosystems and signature schemes. Advin Cryptology-Crypto'84 (1984) 47-53 LNCS196
-
(1984)
Advin Cryptology-Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Zheng Y. (Ed), Springer
-
Zhang F., and Kim K. ID-based blind signature and ring signature from pairings. In: Zheng Y. (Ed). Advances in Cryptology-ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science (2002), Springer 533-547
-
(2002)
Advances in Cryptology-ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
4
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups[A]
-
Springer-Verlag
-
Bresson E., Stern J., and Szydlo M. Threshold ring signatures and applications to ad-hoc groups[A]. Proc CRYPTO'02[C] (2002), Springer-Verlag 465-480
-
(2002)
Proc CRYPTO'02[C]
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
5
-
-
0346265013
-
Forking lemmas for ring signature schemes [A]
-
Springer-Verlag
-
Herranz J., and S'aez G. Forking lemmas for ring signature schemes [A]. Proc INDOCRYPT' 03[C] (2003), Springer-Verlag 266-279
-
(2003)
Proc INDOCRYPT' 03[C]
, pp. 266-279
-
-
Herranz, J.1
S'aez, G.2
-
6
-
-
68849122299
-
-
Fangguo Zhang, REIHANEHSN, LINC Y. New Proxy Signature, Proxy blind signature and proxy ring signature schemes from bilinear pairings [EB/OL]. http://eprint.iacr.org/2003/104,2003.
-
Fangguo Zhang, REIHANEHSN, LINC Y. New Proxy Signature, Proxy blind signature and proxy ring signature schemes from bilinear pairings [EB/OL]. http://eprint.iacr.org/2003/104,2003.
-
-
-
-
8
-
-
23944497675
-
Blind spontaneous anonymous group signatures for ad hoc groups [A]
-
Springer-Verlag
-
Chan T.K., Fung K., Liu J.K., et al. Blind spontaneous anonymous group signatures for ad hoc groups [A]. ESAS 2004[C] (2005), Springer-Verlag 82-94
-
(2005)
ESAS 2004[C]
, pp. 82-94
-
-
Chan, T.K.1
Fung, K.2
Liu, J.K.3
-
9
-
-
24944588207
-
New identity-based ring signature schemes [A]
-
Springer-Verlag
-
Herranz J., and S'aez G. New identity-based ring signature schemes [A]. ICICS2004[C] (2004), Springer-Verlag 27-39
-
(2004)
ICICS2004[C]
, pp. 27-39
-
-
Herranz, J.1
S'aez, G.2
-
10
-
-
26444540788
-
Efficient identity based ring signature[C]
-
Springer-Verlag, Berlin
-
Chow S.S.M., Hui L.C.K., and Yiu S.M. Efficient identity based ring signature[C]. Proc of ACNS 2005 (2005), Springer-Verlag, Berlin 499-512
-
(2005)
Proc of ACNS 2005
, pp. 499-512
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
-
11
-
-
34247324841
-
Identity based anonymous designated ring signatures [A]
-
Canada, Vancouver, British Columbia
-
Chen Y.Q., Susilo W., and Mu Y. Identity based anonymous designated ring signatures [A]. IWCMC' 06[C] (2006), Canada, Vancouver, British Columbia 189-194
-
(2006)
IWCMC' 06[C]
, pp. 189-194
-
-
Chen, Y.Q.1
Susilo, W.2
Mu, Y.3
-
12
-
-
36048992805
-
Identity-based ring signatures from RSA
-
Herranz, and Javier. Identity-based ring signatures from RSA. Theoretical Computer Science 389 1-2 (Dec. 10 2007) 100-117
-
(2007)
Theoretical Computer Science
, vol.389
, Issue.1-2
, pp. 100-117
-
-
Herranz1
Javier2
-
14
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) cost (signature) +cost (encryption)
-
LNCS1294
-
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature) +cost (encryption). Adv in Cryptology-Crypto'97 (1997) 165-179 LNCS1294
-
(1997)
Adv in Cryptology-Crypto'97
, pp. 165-179
-
-
Zheng, Y.1
-
15
-
-
84944242785
-
A Signcryption Scheme Based on Integer Factorization
-
Steinfeld R., and Zheng Y. A Signcryption Scheme Based on Integer Factorization. ISW00, LNCS (2000) 308-322
-
(2000)
ISW00, LNCS
, pp. 308-322
-
-
Steinfeld, R.1
Zheng, Y.2
-
16
-
-
84949961454
-
New signcryption schemes based on KCDSA
-
Yum B.H., and Lee P.J. New signcryption schemes based on KCDSA. ICISC01, LNCS 2288 (2001) 305-317
-
(2001)
ICISC01, LNCS 2288
, pp. 305-317
-
-
Yum, B.H.1
Lee, P.J.2
-
17
-
-
33644646469
-
Efficient Signcryption Schemes On Elliptic Curves
-
Chapman & Hall
-
Zheng Y., and Imai H. Efficient Signcryption Schemes On Elliptic Curves. Proc. of IFIP/ SEC98 (1998), Chapman & Hall
-
(1998)
Proc. of IFIP/ SEC98
-
-
Zheng, Y.1
Imai, H.2
-
18
-
-
84937414347
-
Identification, Signature and Signcryption using High Order Residues Modulo an RSA Composite
-
Springer-Verlag
-
Zheng Y. Identification, Signature and Signcryption using High Order Residues Modulo an RSA Composite. PKC01, LNCS 1992 (2001), Springer-Verlag 48-63
-
(2001)
PKC01, LNCS 1992
, pp. 48-63
-
-
Zheng, Y.1
-
19
-
-
84947929166
-
Signcryption and its applications in efficient public key solutions
-
Zheng Y. Signcryption and its applications in efficient public key solutions. ISW97, LNCS (1998) 291-312
-
(1998)
ISW97, LNCS
, pp. 291-312
-
-
Zheng, Y.1
-
20
-
-
68849127759
-
-
J. Baek, R. Steinfeld, Y. Zheng, Formal Proofs for the Security of Signcryption, PKC 02, LNCS 2274, pp.81-98.
-
J. Baek, R. Steinfeld, Y. Zheng, Formal Proofs for the Security of Signcryption, PKC 02, LNCS 2274, pp.81-98.
-
-
-
-
21
-
-
33744502401
-
-
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. 19th International Conference on Advanced Information Networking and Applications (AINA'05) 2 (INA, USW, WAMIS, and IPv6 papers) pp.649-654.
-
Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 2 (INA, USW, WAMIS, and IPv6 papers) pp.649-654.
-
-
-
-
23
-
-
41649118990
-
Anonymous e-prosecution scheme with reward support
-
Miao F.-Y., Wang X.-F., Miao H., and Xiong Y. Anonymous e-prosecution scheme with reward support. Tien Tzu Hsueh Pao/Acta Electronica Sinica 36 2 (February 2008) 320-324
-
(2008)
Tien Tzu Hsueh Pao/Acta Electronica Sinica
, vol.36
, Issue.2
, pp. 320-324
-
-
Miao, F.-Y.1
Wang, X.-F.2
Miao, H.3
Xiong, Y.4
|