-
1
-
-
32544436746
-
Proxy blind signature scheme
-
January
-
A. K. Awasthi, S. Lal. "Proxy blind signature scheme," Transaction on Cryptology, Vol. 2, No. 1, January 2005, pp. 5-11.
-
(2005)
Transaction On Cryptology
, vol.2
, Issue.1
, pp. 5-11
-
-
Awasthi, A.K.1
Lal, S.2
-
2
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
LNCS, Vol. 2139, Springer-Verlag
-
D. Boneh, M. Franklin. "Identity based encryption from the Weil pairing," Advances in Cryptology-Cryto'01, LNCS, Vol. 2139, Springer-Verlag, 2001, pp. 213-229.
-
(2001)
Advances In Cryptology-Cryto'01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the Weil pairing
-
LNCS, Springer-Verlag
-
D. Boneh, B. Lynn, H. Shacham. "Short signatures from the Weil pairing," Advances in Cryptology-Asiacryp'01, LNCS, Vol. 2248, Springer-Verlag, 2001, pp. 514-532.
-
(2001)
Advances In Cryptology-Asiacryp'01
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Springer-Verlag
-
J. C. Cha, J. H. Cheon. "An identity-based signature from gap Diffie-Hellman groups," Proceedings of PKC'03, LNCS, Vol. 2567, Springer-Verlag, 2003, pp. 18-30.
-
(2003)
Proceedings of PKC'03, LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
5
-
-
78650397997
-
Efficient proxy signatures based on trapdoor hash functions
-
December
-
S. Chandrasekhar, S. Chakrabarti, M. Singhal, K. L. Calvert. "Efficient proxy signatures based on trapdoor hash functions," IET Information Security, Vol. 4, No. 4, December 2010, pp. 322-332.
-
(2010)
IET Information Security
, vol.4
, Issue.4
, pp. 322-332
-
-
Chandrasekhar, S.1
Chakrabarti, S.2
Singhal, M.3
Calvert, K.L.4
-
6
-
-
84872238446
-
Efficient multi-proxymulti-signature schemes based on DLP
-
February
-
Y. F. Chang, C. C. Chang. "Efficient multi-proxymulti-signature schemes based on DLP," International Journal of Computer Science and Network Security, Vol. 6, No. 2B, February 2006, pp. 152-159.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, pp. 152-159
-
-
Chang, Y.F.1
Chang, C.C.2
-
7
-
-
56649114655
-
An RSA-based (t,n) threshold proxy signature scheme with freewill identities
-
Y. F. Chang, C. C. Chang. "An RSA-based (t,n) threshold proxy signature scheme with freewill identities," International Journal of Information and Computer Security, Vol. 1, No. 1/2, 2007, pp. 201-209.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 201-209
-
-
Chang, Y.F.1
Chang, C.C.2
-
8
-
-
63649101521
-
Robust t-out-of-n proxy signature based on RSA cryptosystems
-
February
-
Y. F. Chang, C. C. Chang. "Robust t-out-of-n proxy signature based on RSA cryptosystems," International Journal of Innovative Computing Information and Control, Vol. 4, No. 2, February 2008, pp. 425-431.
-
(2008)
International Journal of Innovative Computing Information and Control
, vol.4
, Issue.2
, pp. 425-431
-
-
Chang, Y.F.1
Chang, C.C.2
-
9
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
LNCS, Springer-Verlag
-
F. Hess. "Efficient identity based signature schemes based on pairings," Proceedings of SAC'02, LNCS, Vol. 2595, Springer-Verlag, 2002, pp. 310-324.
-
(2002)
Proceedings of SAC'02
, vol.2595
, pp. 310-324
-
-
Hes, F.1
-
10
-
-
33751417424
-
A novel proxy key generation protocol and its application
-
X. Hu, S. Huang. "A novel proxy key generation protocol and its application," Computer Standards &interfaces, Vol. 29, 2007, 191-195.
-
(2007)
Computer Standards &interfaces
, vol.29
, pp. 191-195
-
-
Hu, X.1
Huang, S.2
-
11
-
-
84872222358
-
An improved twoparty identity-based authenticated key agreement protocol using pairings
-
Article in Press, Available online 27 January
-
M. Hölbl, T. Welzer, B. Brumen. "An improved twoparty identity-based authenticated key agreement protocol using pairings," Journal of Computer and System Sciences, Article in Press, Available online 27 January 2011.
-
(2011)
Journal of Computer and System Sciences
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
12
-
-
84872254411
-
-
LAP Lambert Academic Publishing AG & Co KG, ISBN: 9783844382266
-
J. Kar. Proxy Blind Multi-signature Scheme, LAP Lambert Academic Publishing AG & Co KG, ISBN: 9783844382266, 2011.
-
(2011)
Proxy Blind Multi-signature Scheme
-
-
Kar, J.1
-
13
-
-
78650357764
-
Self proxy signature scheme
-
February
-
Y. S. Kim, J. H. Chang. "Self proxy signature scheme," IJCSNS International Journal of Computer Science and Network Security, Vol. 7, No. 2, February 2007, pp. 335-338.
-
(2007)
IJCSNS International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 335-338
-
-
Kim, Y.S.1
Chang, J.H.2
-
14
-
-
78049311231
-
Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
-
J. S. Lee, J. H. Chang, D. H. Lee. "Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof," Computers and Electrical Engineering, Vol. 36, 2010, pp. 948-954.
-
(2010)
Computers and Electrical Engineering
, vol.36
, pp. 948-954
-
-
Lee, J.S.1
Chang, J.H.2
Lee, D.H.3
-
15
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
LNCS, Springer-Verlag
-
B. Lee, H. Kim, K. Won. "Secure mobile agent using strong non-designated proxy signature," Proceedings of ACISP'01, LNCS, Vol. 2119, Springer-Verlag, 2001, pp. 474-486.
-
(2001)
Proceedings of ACISP'01
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Won, K.3
-
16
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, E. Okamoto. "Proxy signature: delegation of the power to sign messages," IEICE Transactions on Fundamentals, Vol. E79-A, No. 9, 1996, pp. 1338-1354.
-
(1996)
IEICE Transactions On Fundamentals
, vol.E79-A
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
55749094333
-
A privacy problem on Hu-Huang's proxy key generation protocol
-
H. Park, S. Lim, I. Yie. "A privacy problem on Hu-Huang's proxy key generation protocol," Computer Standards & Interfaces, Vol. 31, 2009, pp. 480-483.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 480-483
-
-
Park, H.1
Lim, S.2
Yie, I.3
-
18
-
-
78650345976
-
Identity based self delegated signature - self proxy signatures
-
Melbourne, Australia
-
S. S. D. Selvi, S. S. Vivek, S. Gopinath, C. P. Rangan. "Identity based self delegated signature - self proxy signatures," Proceedings of 2010 Fourth International Conference on Network and System Security, Melbourne, Australia, 2010, pp.568-573.
-
(2010)
Proceedings of 2010 Fourth International Conference On Network and System Security
, pp. 568-573
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Gopinath, S.3
Rangan, C.P.4
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir. "Identity-based cryptosystems and signature schemes," Advances in Cryptology -Crypto'84, LNCS, Vol. 196, Springer-Verlag, 1984, pp.47-53.
-
(1984)
Advances In Cryptology -Crypto'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
79955721446
-
Short designated verifier proxy signature
-
K. A. Shim. "Short designated verifier proxy signature," Computers and Electrical Engineering, Vol. 37, No. 2, 2011, pp. 180-186.
-
(2011)
Computers and Electrical Engineering
, vol.37
, Issue.2
, pp. 180-186
-
-
Shim, K.A.1
-
21
-
-
78650973925
-
Improvement of a self proxy signature scheme
-
Q. Xie. "Improvement of a self proxy signature scheme," Applied Mechanics and Materials, Vol. 40-41, 2011, pp. 643-646.
-
(2011)
Applied Mechanics and Materials
, vol.40-41
, pp. 643-646
-
-
Xie, Q.1
-
22
-
-
84855277570
-
An efficient and secure identity-based strong designated verifier signature scheme
-
E. J. Yoon. "An efficient and secure identity-based strong designated verifier signature scheme," Information Technology and Control, Vol. 40, No. 4, 2011, pp. 323-329.
-
(2011)
Information Technology and Control
, vol.40
, Issue.4
, pp. 323-329
-
-
Yoon, E.J.1
|