-
1
-
-
84863369937
-
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
-
H.Wang,Y.Zhang, H.Xiong, B. Qin,Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme,IET Information. Security., 2012, Vol. 6, Iss. 1, pp. 20-27
-
(2012)
IET Information. Security
, vol.6
, Issue.1
, pp. 20-27
-
-
Wang, H.1
Zhang, Y.2
Xiong, H.3
Qin, B.4
-
2
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Fan, D., Huang, L., Ho, P.: Anonymous multireceiver identity-based encryption, IEEE Trans. Comput., 2010, vol.59(9), pp.1239-1249
-
(2010)
IEEE Trans. Comput.
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, D.1
Huang, L.2
Ho, P.3
-
3
-
-
20444502239
-
An Id-based broadcast encryption scheme for key distribution
-
Du, X., Wang, Y., Ge, J. and Wang, Y. An Id-based broadcast encryption scheme for key distribution. IEEE Trans. Broadcast., vol.51, pp.264-266, 2005.
-
(2005)
IEEE Trans. Broadcast.
, vol.51
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
4
-
-
36348947024
-
Comments on an efficient ID-based broadcast encryption scheme
-
Chien, H.Y. Comments on an efficient ID-based broadcast encryption scheme. IEEE Trans. Broadcast., vol.53, pp.809-810,2007.
-
(2007)
IEEE Trans. Broadcast.
, vol.53
, pp. 809-810
-
-
Chien, H.Y.1
-
5
-
-
73849111863
-
Certificateless Partially Blind Signature Scheme
-
Rong Weijian, Certificateless Partially Blind Signature Scheme, Journal of Zhangzhou Normal university, vol.4(2), pp 44-47, 2008.
-
(2008)
Journal of Zhangzhou Normal University
, vol.4
, Issue.2
, pp. 44-47
-
-
Weijian, R.1
-
6
-
-
24144432124
-
Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption
-
PKC 2005
-
Baek, J., Safavi-Naini, R. and Susilo, W. Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PKC 2005, LNCS 3386, pp. 380-397, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
7
-
-
66149159191
-
Pairing-Based Multi-Recipient Public Key Encryption
-
Lu, L. and Hu, L. Pairing-Based Multi-Recipient Public Key Encryption. Proc. 2006 Int. Conf. Security & Management, Las Vegas, Nevada, USA. pp. 159-165, 2006.
-
(2006)
Proc. 2006 Int. Conf. Security & Management, Las Vegas, Nevada, USA
, pp. 159-165
-
-
Lu, L.1
Hu, L.2
-
8
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M.Mambo, K.Usuda and E.Okamot. Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, NO.9, pp 1338-1353, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamot, E.3
-
9
-
-
85020598353
-
Identity Based on Cryptosystems and Signature Schemes
-
Crypto'84
-
Shamir,A., Identity Based on Cryptosystems and Signature Schemes. Crypto'84, LNCS 196, pp.47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
10
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D. and Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput., vol.32, pp.586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
3042609536
-
-
MM Research Preprints, MMRC, AMSS, Academia Sinica, Beijing, December 21
-
Z. Tan, Z. Liu, and C. Tang. Digital proxy blind signature schemes based on DLP and ECDLP. MM Research Preprints, MMRC, AMSS, Academia Sinica, Beijing, December 21, 2002, 212-217
-
(2002)
Digital Proxy Blind Signature Schemes Based on DLP and ECDLP
, pp. 212-217
-
-
Tan, Z.1
Liu, Z.2
Tang, C.3
-
12
-
-
0001604533
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
David Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, Springer-Verlag (1983),
-
(1983)
Advances in Cryptology - Crypto '82
-
-
Chaum, D.1
|