-
1
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Springer-Verlag.
-
Baek, J., Steinfeld, R., and Zheng, Y. (2002). Formal proofs for the security of signcryption. In PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag.
-
(2002)
PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptography, Volume 2274 of Lecture Notes in Computer Science
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
2
-
-
26444540788
-
Efficient identity based ring signature
-
Chow, S. S. M., Yiu, S.-M., and Hui, L. C. K. (2005). Efficient identity based ring signature. In ACNS, volume 3531, pages 499-512.
-
(2005)
ACNS
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
3
-
-
33744502401
-
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
-
IEEE Computer Society.
-
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In AINA '05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pages 649-654. IEEE Computer Society.
-
(2005)
AINA '05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications
, pp. 649-654
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
4
-
-
57949099353
-
Analysis and improvement of authenticatable ring signcryption scheme
-
Li, F., Shirase, M., and Takagi, T. (2008a). Analysis and improvement of authenticatable ring signcryption scheme. In International Conference ProvSec-08, Paper appears in Journal of Shanghai Jiaotong University (Science), volume 13-6, pages 679-683.
-
(2008)
International Conference ProvSec-08, Paper Appears in Journal of Shanghai Jiaotong University (Science)
, vol.13
, Issue.6
, pp. 679-683
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
-
5
-
-
58149171539
-
An efficient id-based ring signcryption scheme
-
Li, F., Xiong, H., and Yu, Y. (2008b). An efficient id-based ring signcryption scheme. In International Conference on Communications, Circuits and Systems, 2008. ICCCAS 2008., pages 483-487.
-
(2008)
International Conference on Communications, Circuits and Systems, 2008. ICCCAS 2008
, pp. 483-487
-
-
Li, F.1
Xiong, H.2
Yu, Y.3
-
6
-
-
0242445175
-
Identity-based signcryption
-
Report 2002/098.
-
Malone-lee, J. (2002). Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098.
-
(2002)
Cryptology EPrint Archive
-
-
Malone-lee, J.1
-
7
-
-
70350754081
-
On the security of identity based ring signcryption schemes
-
Springer.
-
Selvi, S. S. D., Vivek, S. S., and Rangan, C. P. (2009). On the security of identity based ring signcryption schemes. In ISC, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, volume 5735 of Lecture Notes in Computer Science, pages 310-325. Springer.
-
(2009)
ISC, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, Volume 5735 of Lecture Notes in Computer Science
, pp. 310-325
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Rangan, C.P.3
-
8
-
-
74549169971
-
On the security of two ring signcryption schemes
-
INSTICC Press.
-
Vivek, S. S., Selvi, S. S. D., and Rangan, C. P. (2009). On the security of two ring signcryption schemes. In SECRYPT 2009, pages 219-224. INSTICC Press.
-
(2009)
SECRYPT 2009
, pp. 219-224
-
-
Vivek, S.S.1
Selvi, S.S.D.2
Rangan, C.P.3
-
9
-
-
55749111906
-
An efficient identity-based anonymous signcryption scheme
-
December, 2008
-
Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences, Volume: 13, Number: 6, December, 2008: 670-674.
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.6
, pp. 670-674
-
-
Yu, Y.1
Li, F.2
Xu, C.3
Sun, Y.4
-
10
-
-
67649983782
-
A novel id-based anonymous signcryption scheme
-
Springer.
-
Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009a). A novel id-based anonymous signcryption scheme. In APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, pages 604-610. Springer.
-
(2009)
APWeb/WAIM, Volume 5446 of Lecture Notes in Computer Science
, pp. 604-610
-
-
Zhang, J.1
Gao, S.2
Chen, H.3
Geng, Q.4
-
11
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
Springer-Verlag.
-
Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In PAISI, PACCF and SOCO '08: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, pages 126-137. Springer-Verlag.
-
(2008)
PAISI, PACCF and SOCO '08: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics
, pp. 126-137
-
-
Zhang, M.1
Yang, B.2
Zhu, S.3
Zhang, W.4
-
12
-
-
70350432579
-
Analysis and improvement of an id-based anonymous signcryption model
-
Springer.
-
Zhang, M., Zhong, Y., Yang, B., and Zhang, W. (2009b). Analysis and improvement of an id-based anonymous signcryption model. In ICIC (1), volume 5754 of Lecture Notes in Computer Science, pages 433-442. Springer.
-
(2009)
ICIC (1), Volume 5754 of Lecture Notes in Computer Science
, pp. 433-442
-
-
Zhang, M.1
Zhong, Y.2
Yang, B.3
Zhang, W.4
-
13
-
-
68849116766
-
An efficient and provable secure identity based ring signcryption scheme
-
Zhu, Z., Zhang, Y., and Wang, F. (Pages 649-654, http://dx.doi.org/10. 1016/j.csi.2008.09.023>, 2008). An efficient and provable secure identity based ring signcryption scheme. In Computer Standards & Interfaces.
-
(2008)
Computer Standards & Interfaces
, pp. 649-654
-
-
Zhu, Z.1
Zhang, Y.2
Wang, F.3
-
14
-
-
60349116140
-
Efficient identity based ring signature and ring signcryption schemes
-
Zhun, L. and Zhang, F. (2008). Efficient identity based ring signature and ring signcryption schemes. In International Conference on Computational Intelligence and Security, 2008. CIS '08., volume 2, pages 303-307.
-
(2008)
International Conference on Computational Intelligence and Security, 2008. CIS '08
, vol.2
, pp. 303-307
-
-
Zhun, L.1
Zhang, F.2
|