-
1
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of ACM CCS'93, pp. 62-73.
-
(1993)
Proceedings of ACM CCS'
, vol.93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin, M. (2001). Identity-based encryption from the Weil pairing. In: Proceedings of CRYPTO'01, LNCS, Vol. 2139, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
50849102269
-
Contributory group key exchange in the presence of malicious participants
-
Bresson, E., Manulis, M. (2008). Contributory group key exchange in the presence of malicious participants. IET Information Security, 2(3), 85-93.
-
(2008)
IET Information Security
, vol.2
, Issue.3
, pp. 85-93
-
-
Bresson, E.1
Manulis, M.2
-
4
-
-
0035751060
-
Provably authenticated group diffie-hellman key exchange
-
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J. J. (2001). Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of ACM CCS'01, pp. 255-264. (Pubitemid 34974726)
-
(2001)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
5
-
-
15344345559
-
A secure and scalable group key exchange system
-
Burmester, M., Desmedt, Y. (2005). A secure and scalable group key exchange system. Information Processing Letters, 94(3), 137-14.
-
(2005)
Information Processing Letters
, vol.94
, Issue.3
, pp. 137-214
-
-
Burmester, M.1
Desmedt, Y.2
-
6
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Cha, J. C., Cheon, J. H. (2003). An identity-based signature from gap Diffie-Hellman groups. In: Proceedings of PKC'03, LNCS, Vol. 2567, pp. 18-30. (Pubitemid 137638339)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
7
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
DOI 10.1007/s10207-006-0011-9
-
Chen, L., Cheng, Z., Smart, N. P. (2007). Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4), 213-241. (Pubitemid 47023664)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
8
-
-
35048874197
-
Efficient ID-based group key agreement with bilinear maps
-
Proceedings of PKC'04
-
Choi, K. Y., Hwang, J. Y., Lee, D. H. (2004). Efficient ID-based group key agreement with bilinear maps. In: Proceedings of PKC'04, LNCS, Vol. 2947, pp. 130-144.
-
(2004)
LNCS
, vol.2947
, pp. 130-144
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
9
-
-
77951282858
-
ID-based authenticated group key agreement secure against insider attacks
-
Choi, K. Y., Hwang, J. Y., Lee, D. H. (2008). ID-based authenticated group key agreement secure against insider attacks. IEICE Transactions Fundamentals, E91-A (7), 1828-1830.
-
(2008)
IEICE Transactions Fundamentals
, vol.7 E91-A
, pp. 1828-1830
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
11
-
-
80051486109
-
A method of finding bad signatures in an RSA-type batch verification
-
Kim, K, Yie, I., Lim, S., Park, H. (2011). A method of finding bad signatures in an RSA-type batch verification. Informatica, 22(2), 189-201.
-
(2011)
Informatica
, vol.22
, Issue.2
, pp. 189-201
-
-
Kim, K.1
Yie, I.2
Lim, S.3
Park, H.4
-
12
-
-
77949809023
-
Identity-based threshold proxy signature from bilinear pairings
-
Liu, J., Huang, S. (2010). Identity-based threshold proxy signature from bilinear pairings. Informatica, 21(1), 41-56.
-
(2010)
Informatica
, vol.21
, Issue.1
, pp. 41-56
-
-
Liu, J.1
Huang, S.2
-
13
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361-396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
14
-
-
78650287972
-
New fuzzy identity-based encryption in the standard model
-
Ren, Y., Gu, D., Wang, S., Zhang, X. (2010). New fuzzy identity-based encryption in the standard model. Informatica, 21(3), 393-408.
-
(2010)
Informatica
, vol.21
, Issue.3
, pp. 393-408
-
-
Ren, Y.1
Gu, D.2
Wang, S.3
Zhang, X.4
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proceedings of CRYPTO'84
-
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO'84, LNCS, Vol. 196, pp. 47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
33846419850
-
Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
-
Shim, K. A. (2007). Further analysis of ID-based authenticated group key agreement protocol from bilinear maps. IEICE Trans. Fundamentals, E90-A (1), 295-298.
-
(2007)
IEICE Trans. Fundamentals
, vol.E90-A
, Issue.1
, pp. 295-298
-
-
Shim, K.A.1
-
17
-
-
25844432081
-
A robust multi-party key agreement protocol resistant to malicious participants
-
Tseng, Y. M. (2005). A robust multi-party key agreement protocol resistant to malicious participants. The Computer Journal, 48 (4), 480-487.
-
(2005)
The Computer Journal
, vol.48
, Issue.4
, pp. 480-487
-
-
Tseng, Y.M.1
-
18
-
-
34248526025
-
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
-
Tseng, Y. M. (2007). A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. Journal of Systems and Software, 80(7), 1091-1101.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.7
, pp. 1091-1101
-
-
Tseng, Y.M.1
-
19
-
-
71149103376
-
An efficient and provably secure ID-based signature scheme with batch verifications
-
Tseng, Y. M., Wu, T. Y., Wu, J. D. (2009). An efficient and provably secure ID-based signature scheme with batch verifications. International Journal of Innovative Computing, Information and Control, 5(11), 3911-3922.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.11
, pp. 3911-3922
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
20
-
-
77954807684
-
Analysis and improvement on a contributory group key exchange protocol based on the Diffie-Hellman technique
-
Tseng, Y. M., Wu, T. Y. (2010). Analysis and improvement on a contributory group key exchange protocol based on the Diffie-Hellman technique. Informatica, 21(2), 247-258.
-
(2010)
Informatica
, vol.21
, Issue.2
, pp. 247-258
-
-
Tseng, Y.M.1
Wu, T.Y.2
-
21
-
-
47949104161
-
A pairing-based user authentication scheme for wireless clients with smart cards
-
Tseng, Y. M., Wu, T. Y., Wu, J. D. (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285-302.
-
(2008)
Informatica
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
22
-
-
0036538428
-
A secure fault-tolerant conference-key agreement protocol
-
Tzeng, W. G. (2002). A secure fault-tolerant conference-key agreement protocol. IEEE Trans. on Computers, 51(4), 373-379.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.4
, pp. 373-379
-
-
Tzeng, W.G.1
-
23
-
-
77952312664
-
Comments on an ID-based authenticated group key agreement protocol with withstanding insider attacks
-
Wu, T. Y., Tseng, Y. M. (2009). Comments on an ID-based authenticated group key agreement protocol with withstanding insider attacks. IEICE Trans. on Fundamentals, Vol. E92-A(10), 2638-2640.
-
(2009)
IEICE Trans. on Fundamentals
, vol.E92-A
, Issue.10
, pp. 2638-2640
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
24
-
-
77955703761
-
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
-
Wu, T. Y., Tseng, Y. M. (2010). An ID-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal, 53(7), 1062-1070.
-
(2010)
The Computer Journal
, vol.53
, Issue.7
, pp. 1062-1070
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
25
-
-
24944445896
-
Batch verifications with ID-based signatures
-
Information Security and Cryptology - ICISC 2004: 7th International Conference, Revised Selected Papers
-
Yoon, H. J., Cheon, J. H., Kim, Y. (2004). Batch verifications with ID-based signatures. In: Proceedings of ICISC'04, LNCS, Vol. 3506, pp. 233-248. (Pubitemid 41322360)
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 233-248
-
-
Yoon, H.1
Cheon, J.H.2
Kim, Y.3
-
26
-
-
3042717133
-
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
-
Zhang, F., Chen, X. (2004). Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Information Processing Letters, 91(4), 191-193.
-
(2004)
Information Processing Letters
, vol.91
, Issue.4
, pp. 191-193
-
-
Zhang, F.1
Chen, X.2
|