-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
SpringerVerlag New York, USA
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Proceedings of CRYPTO'84 on Advances in cryptology, SpringerVerlag, New York, USA, 1984, pp. 47-53.
-
(1984)
Proceedings of CRYPTO'84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM Journal on Computing, vol. 32, 2003, pp. 586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, H Shacham, "Short signatures from the Weil pairing," Journal of Cryptology vol. 17, no. 4, 2004, pp. 297-319.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz, "Elliptic curve cryptosystem," Journal of Mathematics of Computation, vol. 48, no. 177, 1987, pp. 203-209.
-
(1987)
Journal of Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer-Verlag, New York
-
V.S. Miller, "Use of elliptic curves in cryptography," Proceeding on Advances in cryptology-CRYPTO'85, Springer-Verlag, New York, 1985, pp. 417-426.
-
(1985)
Proceeding on Advances in Cryptology-CRYPTO'85
, pp. 417-426
-
-
Miller, V.S.1
-
6
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
X. Cao, W. Kou and X. Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Information Sciences, vol. 180, 2010, pp. 2895-2903.
-
(2010)
Information Sciences
, vol.180
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
7
-
-
80052774690
-
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
S. H. Islam and G. P. Biswas, "A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," Journal of Systems and Software, vol. 84, 2011, pp. 1892-1898.
-
(2011)
Journal of Systems and Software
, vol.84
, pp. 1892-1898
-
-
Islam, S.H.1
Biswas, G.P.2
-
8
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
DOIs: 10.1016/j.mcm.2011.07.001
-
S. H. Islam and G. P. Biswas, "Design of improved password authentication and update scheme based on elliptic curve cryptography," Mathematical and Computer Modelling, 2011, DOIs: 10.1016/j.mcm.2011.07.001.
-
(2011)
Mathematical and Computer Modelling
-
-
Islam, S.H.1
Biswas, G.P.2
-
9
-
-
80052224909
-
Improved remote login scheme based on ECC
-
Chennai, India
-
S. H. Islam and G. P. Biswas, "Improved Remote login Scheme based on ECC," International Conference on Recent Trends in Information Technology (ICRTIT 2011), Chennai, India, 2011, pp. 1221 - 1226.
-
(2011)
International Conference on Recent Trends in Information Technology (ICRTIT 2011)
, pp. 1221-1226
-
-
Islam, S.H.1
Biswas, G.P.2
-
10
-
-
78049311231
-
Forgery attacks on kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
-
J. S. Lee, J. H. Chang and D. H. Lee, "Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof," Computers and Electrical Engineering, vol. 36, 2010, pp. 948-954.
-
(2010)
Computers and Electrical Engineering
, vol.36
, pp. 948-954
-
-
Lee, J.S.1
Chang, J.H.2
Lee, D.H.3
-
11
-
-
58449129370
-
A novel identity-based strong designated verifier signature scheme
-
B. Kang, C. Boyd and E. Dawson, "A novel identity-based strong designated verifier signature scheme," The Journal of Systems and Software, vol. 82, 2009, pp. 270-273.
-
(2009)
The Journal of Systems and Software
, vol.82
, pp. 270-273
-
-
Kang, B.1
Boyd, C.2
Dawson, E.3
-
12
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures: delegation of the power to sign messages," IEICE Transactions on Fundamentals, vol. E79-A, no. 9, 1996, pp. 1338-1354.
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
14
-
-
0010567510
-
Proxy signatures, revisited
-
LNCS, Springer-Verlag
-
S. Kim, S. Park and D. Won, "Proxy signatures, revisited," In: ICICS'97, LNCS, Springer-Verlag, 1997, pp. 223-232.
-
(1997)
ICICS'97
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
15
-
-
84927752554
-
Designated verifier proofs and their applications
-
LNCS Springer-Verlag
-
M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications," In: Advances in cryptology: Eurocrypt'96, LNCS, vol.1070, Springer-Verlag, 1996, pp. 142-54.
-
(1996)
Advances in Cryptology: Eurocrypt'96
, vol.1070
, pp. 142-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
16
-
-
24744449733
-
A proposal for short signature scheme using pairings
-
IEEE Computer Society
-
T. Okamoto, A. Inomata and E. Okamoto, A proposal for short signature scheme using pairings, ITCC 2005, IEEE Computer Society, 2005, pp. 631-635.
-
(2005)
ITCC 2005
, pp. 631-635
-
-
Okamoto, T.1
Inomata, A.2
Okamoto, E.3
-
17
-
-
33744906308
-
Short designated verifier proxy signature from pairings
-
LNCS
-
X. Huang, Y. Mu, W. Susilo and F. Zhang, "Short designated verifier proxy signature from pairings," In: EUC Workshops 2005, in: LNCS, vol. 3823, 2005, pp. 835-844.
-
(2005)
EUC Workshops 2005
, vol.3823
, pp. 835-844
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Zhang, F.4
-
18
-
-
79955721446
-
Short designated verifier proxy signatures
-
K-A. Shim, "Short designated verifier proxy signatures," Computers and Electrical Engineering, vol. 37, 2011, pp. 180-186.
-
(2011)
Computers and Electrical Engineering
, vol.37
, pp. 180-186
-
-
Shim, K.-A.1
-
19
-
-
33751417424
-
A novel proxy key generation protocol and its application
-
X. Hu and S. Huang, "A novel proxy key generation protocol and its application," Computer Standards & Interfaces, vol. 29, 2007, pp. 191-195.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 191-195
-
-
Hu, X.1
Huang, S.2
-
20
-
-
55749094333
-
A privacy problem on hu-huang's proxy key generation protocol
-
H. Park, S. Lim, and I. Yie, "A privacy problem on Hu-Huang's proxy key generation protocol," Computer Standards & Interfaces, vol. 31, 2009, pp. 480-483.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 480-483
-
-
Park, H.1
Lim, S.2
Yie, I.3
|