-
2
-
-
84957808128
-
A digital multisignature scheme based on the Fiat-Shamir scheme
-
Imai H, Rivest R, Matsumoto T, eds, LNCS 739, Berlin: Springer-Verlag
-
Ohta K, Okamoto T. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Imai H, Rivest R, Matsumoto T, eds. Proc. of the Asiacrypt 1991. LNCS 739, Berlin: Springer-Verlag, 1991. 139-148.
-
(1991)
Proc. of the Asiacrypt 1991
, pp. 139-148
-
-
Ohta, K.1
Okamoto, T.2
-
3
-
-
35248880074
-
Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme
-
Desmedt Y, ed, LNCS 2567, Berlin: Springer-Verlag
-
Boldyreva A. Threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme. In: Desmedt Y, ed. Proc. of the PKC 2003. LNCS 2567, Berlin: Springer-Verlag, 2002. 31-46.
-
(2002)
Proc. of the PKC 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
4
-
-
33750279428
-
Formal security model of multisignatures
-
Katsikas S, Lopez J, Backes M, Gritzalis S, Preneel B, eds. LNCS 4176, Berlin: Springer-Verlag
-
Komano Y, Ohta K, Shimbo A, Kawamura S. Formal security model of multisignatures. In: Katsikas S, Lopez J, Backes M, Gritzalis S, Preneel B, eds. Proc. of the ISC 2006. LNCS 4176, Berlin: Springer-Verlag, 2006. 146-160.
-
(2006)
Proc. of the ISC 2006
, pp. 146-160
-
-
Komano, Y.1
Ohta, K.2
Shimbo, A.3
Kawamura, S.4
-
5
-
-
4243506511
-
Two remarks on public key cryptology
-
Anderson R. Two remarks on public key cryptology. In: Proc. of the Invited Lecture, ACM-CCS'97. 1997. http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-549.pdf
-
(1997)
Proc. of the Invited Lecture, ACM-CCS'97
-
-
Anderson, R.1
-
6
-
-
79958074367
-
A forward-secure digital signature scheme
-
Wiener M, ed, LNCS 1666, Berlin: Springer-Verlag
-
Bellare M, Miner S. A forward-secure digital signature scheme. In: Wiener M, ed. Proc. of the CRYPTO'99. LNCS 1666, Berlin: Springer-Verlag, 1999. 431-448.
-
(1999)
Proc. of the CRYPTO'99
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
7
-
-
84937427768
-
A new forward-secure digital signature scheme
-
Okamoto T, ed, LNCS 1976, Berlin: Springer-Verlag
-
Abdalla M, Reyzin L. A new forward-secure digital signature scheme. In: Okamoto T, ed. Proc. of the Asiacrypt 2000. LNCS 1976, Berlin: Springer-Verlag, 2000. 116-129.
-
(2000)
Proc. of the Asiacrypt 2000
, pp. 116-129
-
-
Abdalla, M.1
Reyzin, L.2
-
8
-
-
0037885445
-
Forward-Secure signatures with optimal signing and verifying
-
Kilian J, ed, LNCS 2139, Berlin: Springer-Verlag
-
Itkis G, Reyzin L. Forward-Secure signatures with optimal signing and verifying. In: Kilian J, ed. Proc. of the Crypto 2001. LNCS 2139, Berlin: Springer-Verlag, 2001. 499-514.
-
(2001)
Proc. of the Crypto 2001
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
9
-
-
8644265443
-
Forward-Secure signatures with fast key update
-
Cimato S, Galdi C, Persiano G, eds, LNCS 2576, Berlin: Springer-Verlag
-
Kozlov A, Reyzin L. Forward-Secure signatures with fast key update. In: Cimato S, Galdi C, Persiano G, eds. Proc. of the Security in Communication Networks 2002. LNCS 2576, Berlin: Springer-Verlag, 2002. 247-262.
-
(2002)
Proc. of the Security in Communication Networks 2002
, pp. 247-262
-
-
Kozlov, A.1
Reyzin, L.2
-
10
-
-
33747840069
-
A new forward secure signature scheme using bilinear maps
-
Hu F, Wu C, Irwin J. A new forward secure signature scheme using bilinear maps. Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/188.pdf
-
(2003)
Cryptology ePrint Archive
-
-
Hu, F.1
Wu, C.2
Irwin, J.3
-
13
-
-
57049184685
-
Construction of yet another forward secure signature scheme using bilinear maps
-
Baek J, Bao F, Chen K, Lai X, eds, LNCS 5324, Berlin: Springer-Verlag
-
Yu J, Kong F, Cheng X, Hao R, Li G. Construction of yet another forward secure signature scheme using bilinear maps. In: Baek J, Bao F, Chen K, Lai X, eds. Proc. of the ProvSec 2008. LNCS 5324, Berlin: Springer-Verlag, 2008. 83-97.
-
(2008)
Proc. of the ProvSec 2008
, pp. 83-97
-
-
Yu, J.1
Kong, F.2
Cheng, X.3
Hao, R.4
Li, G.5
-
14
-
-
35248813300
-
Strong key-insulated signature scheme
-
Desmedt Y, ed, LNCS 2567, Berlin: Springer-Verlag
-
Dodis Y, Katz J, Xu S, Yung M. Strong key-insulated signature scheme. In: Desmedt Y, ed. Proc. of the PKC 2003. LNCS 2567, Berlin: Springer-Verlag, 2003. 130-144.
-
(2003)
Proc. of the PKC 2003
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
15
-
-
46449132578
-
Identity-Based strong key-insulated signature without random oracles
-
in Chinese, doi:10.3724/SP.J.1001.2008.01555
-
Weng J, Chen KF, Liu SL, Li XX. Identity-Based strong key-insulated signature without random oracles. Journal of Software, 2008, 19(6): 1555-1564 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/1555.htm [doi:10.3724/SP.J.1001.2008.01555]
-
(2008)
Journal of Software
, vol.19
, Issue.6
, pp. 1555-1564
-
-
Weng, J.1
Chen, K.F.2
Liu, S.L.3
Li, X.X.4
-
16
-
-
84937422774
-
SiBIR: Signer-Base intrusion-resilient signatures
-
Yung M, ed, LNCS 2442, Berlin: Springer-Verlag
-
Itkis G, Reyzin L. SiBIR: Signer-Base intrusion-resilient signatures. In: Yung M, ed. Proc. of the Crypto 2002. LNCS 2442, Berlin: Springer-Verlag, 2002. 499-514.
-
(2002)
Proc. of the Crypto 2002
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
17
-
-
33845932628
-
Efficient intrusion-resilient signatures without random oracles
-
Lipmaa H, Yung M, Lin D, eds, LNCS 4318, Berlin: Springer-Verlag
-
Libert B, Quisquater J, Yung M. Efficient intrusion-resilient signatures without random oracles. In: Lipmaa H, Yung M, Lin D, eds. Proc. of the Inscrypt 2006. LNCS 4318, Berlin: Springer-Verlag, 2006. 27-41.
-
(2006)
Proc. of the Inscrypt 2006
, pp. 27-41
-
-
Libert, B.1
Quisquater, J.2
Yung, M.3
-
18
-
-
77957938011
-
Intrusion-Resilient signature scheme with provable security
-
in Chinese, doi: 10.3724/SP.J.1001.2010.03772
-
Yu J, Kong F, Cheng X, Hao R, Guo XF. Intrusion-Resilient signature scheme with provable security. Journal of Software, 2010, 21(9): 2352-2366 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3772.htm [doi: 10.3724/SP.J.1001.2010.03772]
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2352-2366
-
-
Yu, J.1
Kong, F.2
Cheng, X.3
Hao, R.4
Guo, X.F.5
-
19
-
-
8644277142
-
A forward secure multisignature scheme
-
in Chinese
-
Wang X, Fu F, Zhang Z. A forward secure multisignature scheme. Chinese Journal of Computers, 2004, 27(9): 1177-1181 (in Chinese with English abstract).
-
(2004)
Chinese Journal of Computers
, vol.27
, Issue.9
, pp. 1177-1181
-
-
Wang, X.1
Fu, F.2
Zhang, Z.3
-
20
-
-
26044434381
-
Forward-Secure multisignature and blind signature schemes
-
doi: 10.1016/j.amc.2004.09.015
-
Sherman S, Lucas C, Yiu S, Chow K. Forward-Secure multisignature and blind signature schemes. Applied Mathematics and Computation, 2005, 168(2): 895-908. [doi: 10.1016/j.amc.2004.09.015]
-
(2005)
Applied Mathematics and Computation
, vol.168
, Issue.2
, pp. 895-908
-
-
Sherman, S.1
Lucas, C.2
Yiu, S.3
Chow, K.4
-
21
-
-
58449125430
-
Forward-Secure multi-signatures
-
Parashar M, Aggarwal S, eds, LNCS 5375, Berlin: Springer-Verlag
-
Sunitha N, Amberker B. Forward-Secure multi-signatures. In: Parashar M, Aggarwal S, eds. Proc. of the ICDCIT 2008. LNCS 5375, Berlin: Springer-Verlag, 2008. 89-99.
-
(2008)
Proc. of the ICDCIT 2008
, pp. 89-99
-
-
Sunitha, N.1
Amberker, B.2
-
22
-
-
78650472090
-
Cryptanalysis of a type of forward secure signatures and multi-signatures
-
Yu J, Hao R, Kong F, Cheng X, Zhao H, Chen Y. Cryptanalysis of a type of forward secure signatures and multi-signatures. Int'l Journal of Computers and Applications, 2010, 32(4): 1-6.
-
(2010)
Int'l Journal of Computers and Applications
, vol.32
, Issue.4
, pp. 1-6
-
-
Yu, J.1
Hao, R.2
Kong, F.3
Cheng, X.4
Zhao, H.5
Chen, Y.6
-
23
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Biham E, ed. LNCS 2656, Berlin: Springer-Verlag
-
Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme. In: Biham E, ed. Proc. of the Eurocrypt 2003. LNCS 2656, Berlin: Springer-Verlag, 2003. 255-271.
-
(2003)
Proc. of the Eurocrypt 2003
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
24
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer R, ed, LNCS 3493, Berlin: Springer-Verlag
-
Boneh D, Boyen X, Goh E. Hierarchical identity based encryption with constant size ciphertext. In: Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3493, Berlin: Springer-Verlag, 2005. 440-456.
-
(2005)
Proc. of the Eurocrypt 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
25
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer R, ed. LNCS 3494, Berlin: Springer-Verlag
-
Waters B. Efficient identity-based encryption without random oracles. In: Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 114-127.
-
(2005)
Proc. of the Eurocrypt 2005
, pp. 114-127
-
-
Waters, B.1
|