-
1
-
-
84958744427
-
1-out-ofn signatures from a variety of keys
-
London, UK. Springer-Verlag
-
Abe, M., Ohkubo, M., and Suzuki, K. (2002). 1-out-ofn signatures from a variety of keys. In ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, pages 415-432, London, UK. Springer-Verlag.
-
(2002)
ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
3876 LNCS DOI 10.1007/11681878-4, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Bender, A., Katz, J., and Morselli, R. (2006). Ring signatures: Stronger definitions, and constructions without random oracles. In TCC 06, volume 3876 of Lecture Notes in Computer Science, pages 60-79. Springer. (Pubitemid 43979844)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
3
-
-
33847737301
-
Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem
-
Atlantis Press
-
Chung, Y.-F., Wu, Z. Y., Lai, F., and Chen, T.-S. (2006). Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem. In JCIS 06. Atlantis Press.
-
(2006)
JCIS
, vol.6
-
-
Chung, Y.-F.1
Wu, Z.Y.2
Lai, F.3
Chen, T.-S.4
-
5
-
-
33744502401
-
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
-
DOI 10.1109/AINA.2005.205, 1423769, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In AINA '05, pages 649-654. (Pubitemid 43804104)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 649-654
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
6
-
-
74549121871
-
Analysis and improvement of authenticatable ring signcryption scheme
-
Li, F., Shirase, M., and Takagi, T. (2008a). Analysis and improvement of authenticatable ring signcryption scheme. In ProvSec '08.
-
(2008)
ProvSec '08
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
-
7
-
-
58149171539
-
An efficient idbased ring signcryption scheme
-
IEEE
-
Li, F., Xiong, H., and Yu, Y. (2008b). An efficient idbased ring signcryption scheme. In International Conference on Communications, Circuits and Systems 2008. ICCCAS 2008., pages 483-487. IEEE.
-
(2008)
International Conference on Communications, Circuits and Systems 2008. ICCCAS 2008
, pp. 483-487
-
-
Li, F.1
Xiong, H.2
Yu, Y.3
-
8
-
-
84946833891
-
How to leak a secret
-
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How to leak a secret. InASIACRYPT '01, pages 552-565.
-
(2001)
ASIACRYPT '01
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
41649086182
-
A secure ring signcryption scheme for private and anonymous communication
-
Washington, DC, USA. IEEE Computer Society
-
Wang, L., Zhang, G., and Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In NPC '07: Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops, pages 107-111, Washington, DC, USA. IEEE Computer Society.
-
(2007)
NPC '07: Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
, pp. 107-111
-
-
Wang, L.1
Zhang, G.2
Ma, C.3
-
10
-
-
55749111906
-
An efficient identity-based anonymous signcryption scheme
-
December, 2008
-
Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences, Volume: 13, Number:6, December, 2008:670-674.
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.6
, pp. 670-674
-
-
Yu, Y.1
Li, F.2
Xu, C.3
Sun, Y.4
-
13
-
-
67649983782
-
A novel id-based anonymous signcryption scheme
-
Springer
-
Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009). A novel id-based anonymous signcryption scheme. In APWeb/WAIM '09, volume 5446 of Lecture Notes in Computer Science, pages 604-610. Springer.
-
(2009)
APWeb/WAIM '09, Volume 5446 of Lecture Notes in Computer Science
, pp. 604-610
-
-
Zhang, J.1
Gao, S.2
Chen, H.3
Geng, Q.4
-
14
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
Springer-Verlag
-
Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In PAISI, PACCF and SOCO '08: Proceedings of the IEEEISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, pages 126-137. Springer-Verlag.
-
(2008)
PAISI, PACCF and SOCO '08: Proceedings of the IEEEISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics
, pp. 126-137
-
-
Zhang, M.1
Yang, B.2
Zhu, S.3
Zhang, W.4
-
15
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption)
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption). In CRYPTO '97, pages 165-179.
-
(1997)
CRYPTO '97
, pp. 165-179
-
-
Zheng, Y.1
-
16
-
-
60349116140
-
Efficient idbased ring signature and ring signcryption schemes
-
Zhun, L. and Zhang, F. (2008). Efficient idbased ring signature and ring signcryption schemes. In International Conference on Computational Intelligence and Security, 2008. CIS '08, volume 2, pages 303-307.
-
(2008)
International Conference on Computational Intelligence and Security, 2008. CIS '08
, vol.2
, pp. 303-307
-
-
Zhun, L.1
Zhang, F.2
|