-
1
-
-
84955599449
-
How to date blind signatures
-
ASIACRYPT 1996 Springer-Verlag
-
M. Abe, E. Fujisaki, How to date blind signatures, ASIACRYPT 1996, LNCS, vol. 1163, pages 244-251, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
ASIACRYPT 2003 Springer-Verlag
-
S. Al-Riyami and K. Paterson, Certificateless public key cryptography, ASIACRYPT 2003, LNCS, vol. 2894, pages 452-473, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
3
-
-
84876300178
-
-
ACM ASIACCS 2007
-
M. Au, J. Chen, J. Liu, Y. Mu, D. Wong and G. Yang, Malicious KGC attacks in certificateless cryptography, ACM ASIACCS 2007, pages 302-311, 2007.
-
(2007)
Malicious KGC Attacks in Certificateless Cryptography
, pp. 302-311
-
-
Au, M.1
Chen, J.2
Liu, J.3
Mu, Y.4
Wong, D.5
Yang, G.6
-
5
-
-
0020915882
-
Blind signatures for untraceable payments Crypto 1982
-
Springer-Verlag
-
D. Chaum, Blind signatures for untraceable payments, Crypto 1982, LNCS, pages 199-203, Springer-Verlag, 1983.
-
(1983)
LNCS
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
26444573086
-
Two improved partially blind signature schemes from bilinear pairings
-
ACISP 2005 Springer-Verlag
-
S. Chow, L. Hui, S. Yiu, and K. Chow, Two improved partially blind signature schemes from bilinear pairings, ACISP 2005, LNCS, vol. 3574, pages 316-328, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3574
, pp. 316-328
-
-
Chow, S.1
Hui, L.2
Yiu, S.3
Chow, K.4
-
7
-
-
40249085730
-
Certificateless encryption schemes strongly secure in the standard model
-
PKC 2008 Springer-Verlag
-
A. Dent, B. Libert and K. Paterson, Certificateless encryption schemes strongly secure in the standard model, PKC 2008, LNCS, vol. 4939, pages 344-359, Springer-Verlag, 2008.
-
(2008)
LNCS
, vol.4939
, pp. 344-359
-
-
Dent, A.1
Libert, B.2
Paterson, K.3
-
8
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
ACISP 2006 Springer-Verlag
-
B. Hu, D. Wong, Z. Zhang and X. Deng, Key replacement attack against a generic construction of certificateless signature, ACISP 2006, LNCS, vol. 4058, pages 235-346, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4058
, pp. 235-346
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
9
-
-
33744787065
-
Efficient Identity-Based signatures and blind signatures
-
CANS 2005 Springer-Verlag
-
Z. Huang, K. Chen, and Y. Wang, Efficient Identity-Based signatures and blind signatures, CANS 2005, LNCS, vol. 3810, pages 120-133, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3810
, pp. 120-133
-
-
Huang, Z.1
Chen, K.2
Wang, Y.3
-
10
-
-
33744786523
-
On the security of a certificateless signature scheme
-
CANS 2005 Springer-Verlag
-
X. Huang, W. Susilo, Y. Mu and F. Zhang, On the security of a certificateless signature scheme, CANS 2005, LNCS, vol. 3810, pages 13-25, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
11
-
-
38149080541
-
Certificateless signature revisited
-
ACISP 2007 Springer-Verlag
-
X. Huang, Y. Mu, W. Susilo, D. Wong, and W. Wu, Certificateless signature revisited, ACISP 2007, LNCS, vol. 4586, pages 308-322, Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.4
Wu, W.5
-
12
-
-
84927727752
-
Security proofs for signature schemes
-
EUROCRYPT 1996 Springer-Verlag
-
D. Pointcheval and J. Stern, Security proofs for signature schemes, EUROCRYPT 1996, LNCS, vol. 1070, pages 387-398, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
13
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, J. of Cryptology, 2000, 13: 361-396.
-
(2000)
J. of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
14
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
CRYPTO 1984 Springer-Verlag
-
A. Shamir, Identity based cryptosystems and signature schemes, CRYPTO 1984, LNCS, vol. 196, pages 47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
ASIACRYPT 2002 Springer-Verlag
-
F. Zhang and K. Kim, ID-based blind signature and ring signature from pairings, ASIACRYPT 2002, LNCS, vol. 2501, pages 533-547, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
18
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
ACISP 2003 Springer-Verlag
-
F. Zhang and K. Kim, Efficient ID-based blind signature and proxy signature from bilinear pairings, ACISP 2003, LNCS, vol. 2727, pages 312-323, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
19
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
ACNS 2006 Springer-Verlag
-
Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, ACNS 2006, LNCS, vol. 3989, pages 293-308, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3989
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.2
Xu, J.3
Feng, D.4
|