-
1
-
-
33749993205
-
Constant-size dynamic k-TAA
-
Prisco, R.D., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: Prisco, R.D., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
2
-
-
44449163915
-
Proving tight security for rabin-williams signatures
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Bernstein, D.J.: Proving tight security for rabin-williams signatures. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 70-87. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 70-87
-
-
Bernstein, D.J.1
-
3
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology 21(2), 149-177 (2008)
-
(2008)
J. Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M.K. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
85008220662
-
A practical and tightly secure signature scheme without hash function
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Chevallier-Mames, B., Joye, M.: A practical and tightly secure signature scheme without hash function. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 339-356. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 339-356
-
-
Chevallier-Mames, B.1
Joye, M.2
-
7
-
-
84948953220
-
Security analysis of the gennaro-halevi-rabin signature scheme
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Coron, J.S., Naccache, D.: Security analysis of the gennaro-halevi-rabin signature scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 91-101. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 91-101
-
-
Coron, J.S.1
Naccache, D.2
-
8
-
-
85024261619
-
Signature schemes based on the Strong RSA assumption
-
Cramer, R., Shoup, V.: Signature schemes based on the Strong RSA assumption. ACM Trans. Inf. Syst. Secur. 3(3), 161-185 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
35248856345
-
The cramer-shoup strong-RSA Signature scheme revisited
-
Desmedt, Y. (ed.) PKC 2003. Springer, Heidelberg
-
Fischlin, M.: The cramer-shoup strong-RSA Signature scheme revisited. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 116-129. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 116-129
-
-
Fischlin, M.1
-
10
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
51849152334
-
Programmable hash functions and their applications
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 21-38
-
-
Hofheinz, D.1
Kiltz, E.2
-
13
-
-
84959444946
-
Chameleon signatures
-
The Internet Society, San Diego
-
Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS. The Internet Society, San Diego (2000)
-
(2000)
NDSS
-
-
Krawczyk, H.1
Rabin, T.2
-
14
-
-
67651053584
-
Pseudonym systems
-
Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
15
-
-
33745554010
-
Efficient blind and partially blind signatures without random oracles
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 80-99
-
-
Okamoto, T.1
-
16
-
-
0000981417
-
Explicit bounds for some functions of prime numbers
-
Rosser, B.: Explicit bounds for some functions of prime numbers. American Journal of Mathematics 63(1), 211-232 (1941)
-
(1941)
American Journal of Mathematics
, vol.63
, Issue.1
, pp. 211-232
-
-
Rosser, B.1
-
17
-
-
84880883264
-
Improved online/offline signature schemes
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
18
-
-
0035475986
-
New digital signature scheme attaining immunity to adaptive-chosen message attack
-
Zhu, H.: New digital signature scheme attaining immunity to adaptive-chosen message attack. Chinese Journal of Electronics 10(4), 484-486 (2001)
-
(2001)
Chinese Journal of Electronics
, vol.10
, Issue.4
, pp. 484-486
-
-
Zhu, H.1
-
19
-
-
38049071972
-
A formal proof of Zhu's signature scheme
-
ePrint Archive, Report 2003/155
-
Zhu, H.: A formal proof of Zhu's signature scheme. Cryptology ePrint Archive, Report 2003/155 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology
-
-
Zhu, H.1
|