-
1
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
DOI 10.1007/11593447-28, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005) (Pubitemid 43763493)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
2
-
-
35248844436
-
An Identity-Based Signature from Gap Diffie-Hellman Groups
-
Public Key Cryptography - PKC 2003
-
Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002) (Pubitemid 36137125)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
3
-
-
55949088433
-
A secure identity-based proxy multi-signature scheme
-
Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Information Sciences 179, 292-302 (2009)
-
(2009)
Information Sciences
, vol.179
, pp. 292-302
-
-
Cao, F.1
Cao, Z.2
-
4
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security, 213-241 (2006)
-
(2006)
International Journal of Information Security
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
5
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with, minimal message exchanges
-
Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with, minimal message exchanges. Information Sciences 180, 2895-2903 (2010)
-
(2010)
Information Sciences
, vol.180
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
6
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David, P., Jacque, S.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
David, P.1
Jacque, S.2
-
7
-
-
26444570370
-
Provable security of ID-based proxy signature schemes
-
Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
-
Gu, C., Zhu, Y.: Provable security of ID-based proxy signature schemes. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 1277-1286. Springer, Heidelberg (2005) (Pubitemid 41435870)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 1277-1286
-
-
Gu, C.1
Zhu, Y.2
-
8
-
-
54249111511
-
An efficient ID-based proxy signature scheme from pairings
-
Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. Springer, Heidelberg
-
Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 40-50. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4990
, pp. 40-50
-
-
Gu, C.1
Zhu, Y.2
-
9
-
-
84855353789
-
An ID-Based proxy signature schemes without bilinear pairings
-
doi:10.1007/s12243-011-0244-0
-
He, D., Chen, J., Hu, J.: An ID-Based proxy signature schemes without bilinear pairings. Annalas of Telicommunications, doi:10.1007/s12243-011-0244-0
-
Annalas of Telicommunications
-
-
He, D.1
Chen, J.2
Hu, J.3
-
10
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Nyberg, K., Heys, H.M. (eds.) SAC 2002. Springer, Heidelberg
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310-324. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
12
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Transactions Fundamentals E79-A(9), 1338-1353 (1996)
-
(1996)
IEICE Transactions Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
38049022497
-
Identity-based proxy signature from pairings
-
Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. Springer, Heidelberg
-
Wu, W., Mu, Y., Susilo, W., et al.: Identity-based proxy signature from pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 22-31. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4610
, pp. 22-31
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
-
17
-
-
33947604535
-
Another ID-based proxy signature scheme and its extension
-
Zhang, J., Zou, W.: Another ID-based proxy signature scheme and its extension. Wuhan Univ. Journal of Natural Science 12, 133-136 (2007)
-
(2007)
Wuhan Univ. Journal of Natural Science
, vol.12
, pp. 133-136
-
-
Zhang, J.1
Zou, W.2
|