-
1
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamot, "Proxy signature: Delegation of the power to sign messages," IEICE Transactions on Fundamentals, Vol. E79-A, 1996, pp. 1338-1353. (Pubitemid 126763603)
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
2
-
-
33646690058
-
ID-based proxy signature using bilinear pairings
-
Proceedings of Parallel and Distributed Processing and Applications
-
J. XU, Z. Zhang, and D. Feng, "ID-based proxy signature using bilinear pairings," in Proceedings of Parallel and Distributed Processing and Applications, LNCS 3559, 2005, pp. 359-367.
-
(2005)
LNCS
, vol.3559
, pp. 359-367
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
3
-
-
35048832490
-
An un-instantiable random-oracle-model scheme for a hy brid-encryption problem
-
Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques
-
M. Bellare, A. Boldyreva, and A. Palacio, "An un-instantiable random-oracle-model scheme for a hy brid-encryption problem," in Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027, 2004, pp. 171-188.
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
4
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi, "The random oracle methodology, revisited," in Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, 1998, pp. 209-218.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on the Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
5
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
-
J. Nielsen, "Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case," in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, 2002, pp. 111-126.
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.1
-
6
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from pairings
-
Proceedings of the 8th Australasian Conference on Information Security and Privacy
-
F. Zhang and K. Kim, "Efficient ID-based blind signature and proxy signature from pairings," in Proceedings of the 8th Australasian Conference on Information Security and Privacy, LNCS 2727, 2003, pp. 312-323.
-
(2003)
LNCS
, vol.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
-
7
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its application
-
Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
-
F. Zhang, R. Safavi-Naini, and W. Susilo, "An efficient signature schem e from bilinear pairings and its application," in Proceedings of International Workshop on Practice and Theory in Public Key Cryptography, LNCS 2947, 2004, pp. 277-290.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
8
-
-
84973533953
-
An identity-based proxy signature scheme from pairings
-
Proceedings of International Conference on Information and Communications Security
-
K. Shim, "An identity-based proxy signature scheme from pairings," in Proceedings of International Conference on Information and Communications Security, LNCS 4307, 2006, pp. 60-71.
-
(2006)
LNCS
, vol.4307
, pp. 60-71
-
-
Shim, K.1
-
9
-
-
11244339991
-
Secure proxy signature scheme for delegation of signing rights
-
A. Boldyreva, A. Palacio, and B. W arinschi, "Secure proxy signature scheme for delegation of signing rights," IACR ePrint Archive, http://eprint.iacr.org/2003/096.
-
IACR EPrint Archive
-
-
Boldyreva, A.1
Palacio, A.2
Arinschi, B.W.3
-
10
-
-
84880373553
-
Proxy signature without random oracles
-
Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks
-
X. Huang, W. Susilo, Y. M u, and W. Wu, "Proxy signature without random oracles," in Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks, LNCS 4325, 2006, pp. 473-484.
-
(2006)
LNCS
, vol.4325
, pp. 473-484
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Wu, W.4
-
11
-
-
38049022497
-
Identity-based proxy signature from pairings
-
Proceedings of the 4th International Conference on Autonomic and Trusted Computing
-
W. Wu, Y. Mu, W. Susilo, J. Seberry, and X. Huang, "Identity-based proxy signature from pairings," in Proceedings of the 4th International Conference on Autonomic and Trusted Computing, LNCS 4610, 2007, pp. 22-31.
-
(2007)
LNCS
, vol.4610
, pp. 22-31
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Seberry, J.4
Huang, X.5
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptively chosen message attacks
-
S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptively chosen message attacks," SIAM Journal on Computing, Vol. 17, 1998, pp. 281-308.
-
(1998)
SIAM Journal on Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
13
-
-
3042688872
-
Secret computation with secrets for mobile agent using one-time proxy signature
-
H. Kim, J. Beak, B. Lee, and K. Kim, "Secret computation with secrets for mobile agent using one-time proxy signature," in Proceedings of the Symposium on Cryptography and Information Security, 2001, pp. 845-850.
-
(2001)
Proceedings of the Symposium on Cryptography and Information Security
, pp. 845-850
-
-
Kim, H.1
Beak, J.2
Lee, B.3
Kim, K.4
-
14
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim, and K. Kim, "Strong proxy signature and its applications," in Proceedings of the Symposium on Cryptography and Information Security, Vol. 2, 2001, pp. 603-608.
-
(2001)
Proceedings of the Symposium on Cryptography and Information Security
, vol.2
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
15
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for computational grids," in Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998, pp. 83-92.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
16
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
Proceedings of the 3rd International Conference on Information and Communications Security
-
H. U. Park and L. Y. Lee, "A digital nominative proxy signature scheme for mobile communications," in Proceedings of the 3rd International Conference on Information and Communications Security, LNCS 2229, 2001, pp. 451-455.
-
(2001)
LNCS
, vol.2229
, pp. 451-455
-
-
Park, H.U.1
Lee, L.Y.2
-
17
-
-
20244388769
-
An efficient scheme for secure message transmission using proxy-signcryption
-
C. Gamage, J. Leiwo, and Y. Zheng, "An efficient scheme for secure message transmission using proxy-signcryption," in Proceedings of the 22nd Australasian Computer Science, 1999, pp. 420-431.
-
(1999)
Proceedings of the 22nd Australasian Computer Science
, pp. 420-431
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
18
-
-
67349237088
-
Cryptanalysis and im provement of an ID-based ad-hoc anonymous identification scheme at C T-RSA 05
-
F. Zhang and X. Chen, "Cryptanalysis and im provement of an ID-based ad-hoc anonymous identification scheme at C T-RSA 05," Information Processing Letters, Vol. 109, 2009, pp. 846-849.
-
(2009)
Information Processing Letters
, vol.109
, pp. 846-849
-
-
Zhang, F.1
Chen, X.2
-
19
-
-
84927727752
-
Security proofs for signature schemes
-
Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Saragossa
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," in Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Saragossa, LNCS 1070, 1996, pp. 387-398.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
21
-
-
80051502334
-
An effi cient proxy signature scheme without random oracle model
-
J. Zhang, J. Mao, and Y. Yang, "An effi cient proxy signature scheme without random oracle model," in Pre-proceedings II of Information Security and Cryptography, 2008, pp. 535-548.
-
(2008)
Pre-proceedings II of Information Security and Cryptography
, pp. 535-548
-
-
Zhang, J.1
Mao, J.2
Yang, Y.3
-
22
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Proceedings of the 6th Australasian Conference on Information Security and Privacy
-
B. Lee, H. Kim, and K. Kim, "Secure mobile agent using strong non-designated proxy signature," in Proceedings of the 6th Australasian Conference on Information Security and Privacy, LNCS 2119, 2001, pp. 474-486.
-
(2001)
LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
23
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proceedings of the 21st Annual International Cryptology Conference
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139, 2001, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
24
-
-
84887307535
-
A new signature scheme without random oracles from bilinear pairings
-
Proceedings of the 1st International Conference on Cryptology in Vietnam
-
F. Zhang, X. Chen, W. Susilo, and Y. Mu, "A new signature scheme without random oracles from bilinear pairings," in Proceedings of the 1st International Conference on Cryptology in Vietnam, LNCS 4341, 2006, pp. 67-80.
-
(2006)
LNCS
, vol.4341
, pp. 67-80
-
-
Zhang, F.1
Chen, X.2
Susilo, W.3
Mu, Y.4
-
25
-
-
70349840877
-
An efficient secure proxy verifiably encrypted signature scheme
-
J. Zhang, C. Liu, and Y. Yang, "An effici ent secure proxy verifiably encrypted signature scheme," Journal Network and Computer Applications, Vol. 33, 2010, pp. 29-34.
-
(2010)
Journal Network and Computer Applications
, vol.33
, pp. 29-34
-
-
Zhang, J.1
Liu, C.2
Yang, Y.3
|