-
1
-
-
84946833891
-
How to leak a secret
-
Proceedings of Asiacrypt '01, Springer-Verlag
-
R.L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret",Proceedings of Asiacrypt '01, LNCS 2248, Springer-Verlag, 2001,pp. 552-565.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
84958765355
-
ID-Based Blind Signature and Ring Signature from Pairings
-
Proceedings of Asiacrypt'02, Springer-Verlag
-
F.G. Zhang and K. Kim, "ID-Based Blind Signature and Ring Signature from Pairings",Proceedings of Asiacrypt'02, LNCS2501,Springer-Verlag, 2002,pp. 533-547.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.G.1
Kim, K.2
-
3
-
-
0346265013
-
Forking Lemmas for Ring Signature Schemes
-
Proceedings of Indocrypt' 03,Springer-Verlag, Springer-Verlag
-
J.Herranz and G.Saez, "Forking Lemmas for Ring Signature Schemes",Proceedings of Indocrypt' 03,Springer-Verlag, LNCS2904,Springer- Verlag, 2003,pp. 266-279.
-
(2003)
LNCS
, vol.2904
, pp. 266-279
-
-
Herranz, J.1
Saez, G.2
-
4
-
-
33744502401
-
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World
-
IEEE Computer Society Press
-
X.Y. Huang, W. Susilo, Y. Mu and F.T. Zhang, "Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World",AINA'05,IEEE Computer Society Press,2005,pp.649-654.
-
(2005)
AINA'05
, pp. 649-654
-
-
Huang, X.Y.1
Susilo, W.2
Mu, Y.3
Zhang, F.T.4
-
5
-
-
38149083288
-
A Provably Secure Ring Signature Scheme in Certificateless Cryptography
-
ProvSec 2007, Springer-Verlag
-
Zh. L, Zh. Fu Tai,and W Wei, "A Provably Secure Ring Signature Scheme in Certificateless Cryptography",ProvSec 2007,LNCS4784,Springer- Verlag,2007,pp.103-121.
-
(2007)
LNCS
, vol.4784
, pp. 103-121
-
-
Zh, L.1
Zh, F.T.2
Wei, W.3
-
7
-
-
34547348650
-
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
-
K.Amit and L.Sunder,"ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings",International Journal of Network Security,4(2),2007,pp.187-192.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 187-192
-
-
Amit, K.1
Sunder, L.2
-
8
-
-
35048866374
-
Identity Based Undeniable Signatures
-
CT-RSA2004, Berlin:Springer-Verlag
-
L.Benoit and Q.Jean-Jacques,"Identity Based Undeniable Signatures", CT-RSA2004,LNCS2964,Berlin:Springer-Verlag, 2004, pp. 112-125.
-
(2004)
LNCS
, vol.2964
, pp. 112-125
-
-
Benoit, L.1
Jean-Jacques, Q.2
-
9
-
-
82955246861
-
Implementing the Tate Pairing
-
Algorithmic Number Theory Symposium-ANTS V, Berlin: Springer - Verlag
-
S.Galbraith, K.Harrison, and D.Soldera,"Implementing the Tate Pairing", Algorithmic Number Theory Symposium-ANTS V, LNCS2369, Berlin: Springer - Verlag, 2002,pp.324-337.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
10
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Crypt'84, Berlin: Springer-Verlag
-
A.Shamir, "Identity-based Cryptosystems and Signature Schemes",Crypt'84, LNCS196, Berlin: Springer-Verlag, 1984,pp.47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
11
-
-
84958765355
-
ID-based Blind Signature and Ring Signature from Pairings
-
Asiacrypt'02, Berlin:Springer-Verlag
-
F. Zhang and K. Kim, "ID-based Blind Signature and Ring Signature From Pairings", Asiacrypt'02, LNCS 2501, Berlin:Springer-Verlag, 2002,pp.533-547.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
12
-
-
33750713612
-
A New Ring Signature Scheme with Signer-admission Property
-
C.Wang and C.Liu,"A New Ring Signature Scheme with Signer-admission Property",Information Sciences,177,2007,pp.747-754.
-
(2007)
Information Sciences
, vol.177
, pp. 747-754
-
-
Wang, C.1
Liu, C.2
-
13
-
-
84927752554
-
Designated verifier proofs and their applications
-
Proc. of EUROCRYPT'96 Springer-Verlag
-
Jakobsson M, Sako K and Impagliazzo R, "Designated verifier proofs and their applications",Proc. of EUROCRYPT'96. LNCS 1070, Springer-Verlag, 1996,pp.143-154.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
14
-
-
26644445469
-
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction
-
ICALP 2005, Springer-Verlag
-
Helger Lipmaa, Guilin Wang and Feng Bao,"Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction", ICALP 2005,LNCS 3580,Springer-Verlag, 2005,pp.459-471
-
(2005)
LNCS
, vol.3580
, pp. 459-471
-
-
Lipmaa, H.1
Wang, G.2
Bao, F.3
|