-
1
-
-
34547348650
-
ID-based ring signature and proxy ring signature schemes from bilinear pairings
-
A. K. Awasthi and S. Lal, "ID-based ring signature and proxy ring signature schemes from bilinear pairings," International Journal of Network Security, vol. 4, no. 2, pp. 187-192, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 187-192
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer-Verlag
-
P. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," Advances in Cryptology-Crypto'2002, LNCS 2442, pp. 354-368, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-Crypto'2002, LNCS 2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
4
-
-
35048841300
-
Efficient selective ID secure identity based encryption without random oracles
-
Springer-Verlag
-
D. Boneh, X. Boyen, "Efficient selective ID secure identity based encryption without random oracles," Advances In Cryptology-Eurocrypt 2004, LNCS 3027, pp. 223-238, Springer-Verlag, 2004.
-
(2004)
Advances In Cryptology-Eurocrypt 2004, LNCS 3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
Springer-Verlag
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," Eurocrypt 2004, LNCS 3027, pp. 506-522, Springer-Verlag, 2004.
-
(2004)
Eurocrypt 2004, LNCS 3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
J. Kilian, editor, LNCS 2139, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology-CRYPTO 2001, J. Kilian, editor, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
23044517520
-
Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance
-
Springer-Verlag
-
Y. Sakai, K. Sakurai, "Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance," ACISP 2000, LNCS 1841, pp. 59-73, Springer-Verlag, 2000.
-
(2000)
ACISP 2000, LNCS 1841
, pp. 59-73
-
-
Sakai, Y.1
Sakurai, K.2
-
9
-
-
77952589508
-
Building an encrypted and searchable audit log
-
B. Waters, D. Balfanz, G. Durfee, and D. Smetters, "Building an encrypted and searchable audit log," Network and Distributed System Security Symposium (NDSS 2004), pp. 205V214, 2004.
-
(2004)
Network and Distributed System Security Symposium (NDSS 2004)
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
10
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Springer-Verlag
-
F. Zhang, R. Safavi-Naini, and W. Susilo, "An efficient signature scheme from bilinear pairings and its applications," PKC'2004, LNCS 2947, pp. 277-290, Springer-Verlag, 2004.
-
(2004)
PKC'2004, LNCS 2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
11
-
-
80054058425
-
ID-based weak blind signature From bilinear pairings
-
Z. M. Zhao, "ID-based weak blind signature From bilinear pairings," International Journal of Network Security, vol. 7, no. 2, pp. 265-268, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 265-268
-
-
Zhao, Z.M.1
|