-
1
-
-
84958744427
-
1-Out-of-n signatures from a variety of keys
-
LNCS 2501
-
M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys, " Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, pp. 415-432, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2002
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
LNCS 2442
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups, " Advances in Cryptology - CRYPTO 2002, LNCS 2442, pp. 465-480, 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
3
-
-
26444540788
-
Efficient identity based ring signature
-
LNCS 3531
-
S. Chow, S. Yiu, and L. Hui, "Efficient identity based ring signature, " Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, LNCS 3531, pp.499-512, 2005.
-
(2005)
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings
, pp. 499-512
-
-
Chow, S.1
Yiu, S.2
Hui, L.3
-
4
-
-
33845246483
-
Ring signatures without random oracles
-
S. Chow, K. Liu, K. Wei, and T. Yuen, "Ring signatures without random oracles, " Proceedings of AsicCCS 2006, pp. 297-302, 2006.
-
(2006)
Proceedings of AsicCCS 2006
, pp. 297-302
-
-
Chow, S.1
Liu, K.2
Wei, K.3
Yuen, T.4
-
5
-
-
34548123791
-
Forking lemmas for ring signature schemes
-
LNCS 1403
-
J. Herranz, and G. Saez, "Forking lemmas for ring signature schemes, " Indocrypt'03, LNCS 1403, pp. 406-421. 2003.
-
(2003)
Indocrypt'03
, pp. 406-421
-
-
Herranz, J.1
Saez, G.2
-
6
-
-
84927752554
-
Designated verifier proofs and their applications
-
LNCS 1070
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications, " Advances in Cryptology - EUROCRYPT '96, LNCS 1070, pp. 143-154, 1996.
-
(1996)
Advances in Cryptology - EUROCRYPT '96
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
8
-
-
84948973239
-
Message recovery for signature schemes based on the discrete logarithm problem
-
LNCS 950
-
K. Nyberg, and R.A. Rueppel, "Message recovery for signature schemes based on the discrete logarithm problem, " Advances in Cryptology - EUROCRYPT '94. LNCS 950, pp. 182-193, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT '94
, pp. 182-193
-
-
Nyberg, K.1
Rueppel, R.A.2
-
9
-
-
84946833891
-
How to leak a secret
-
LNCS 2248
-
R.L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret, " Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pp.257-265, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 257-265
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
10
-
-
35048866464
-
An effcient strong designated verifier signature scheme
-
LNCS 2971
-
S. Saeednia, S. Kremer, and O. Markowitch, "An effcient strong designated verifier signature scheme, " Information Security and Cryptology - ICISC'03, LNCS 2971, pp. 40-54, 2003.
-
(2003)
Information Security and Cryptology - ICISC'03
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
|