-
3
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
K. Nyberg, Lecture Notes in Computer Science Springer
-
M. Bellare, J.A. Garay, and T. Rabin Fast batch verification for modular exponentiation and digital signatures K. Nyberg, Eurocrypt Lecture Notes in Computer Science vol. 1403 1998 Springer 236 250
-
(1998)
Eurocrypt
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
4
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
D. Boneh, and X. Boyen Short signatures without random oracles and the SDH assumption in bilinear groups J Cryptol 21 2 2008 149 177
-
(2008)
J Cryptol
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048887476
-
Short group signatures
-
M.K. Franklin, Lecture Notes in Computer Science Springer
-
D. Boneh, X. Boyen, and H. Shacham Short group signatures M.K. Franklin, CRYPTO Lecture Notes in Computer Science vol. 3152 2004 Springer 41 55
-
(2004)
CRYPTO
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M.K. Franklin Identity-based encryption from the Weil pairing SIAM J Comput 32 3 2003 586 615
-
(2003)
SIAM J Comput
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
E. Biham, Lecture Notes in Computer Science Springer
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham Aggregate and verifiably encrypted signatures from bilinear maps E. Biham, Eurocrypt Lecture Notes in Computer Science vol. 2656 2003 Springer 416 432
-
(2003)
Eurocrypt
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
8
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
V. Shoup, Lecture Notes in Computer Science Springer
-
D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys V. Shoup, CRYPTO Lecture Notes in Computer Science vol. 3621 2005 Springer 258 275
-
(2005)
CRYPTO
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
9
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing J Cryptol 17 4 2004 297 319
-
(2004)
J Cryptol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
14844309671
-
Group signatures with verifier-local revocation
-
V. Atluri, B. Pfitzmann, P.D. McDaniel, ACM
-
D. Boneh, and H. Shacham Group signatures with verifier-local revocation V. Atluri, B. Pfitzmann, P.D. McDaniel, ACM conference on computer and communications security 2004 ACM 168 177
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
11
-
-
38049115330
-
Mesh signatures
-
M. Naor, Lecture Notes in Computer Science Springer
-
X. Boyen Mesh signatures M. Naor, EUROCRYPT Lecture Notes in Computer Science vol. 4515 2007 Springer 210 227
-
(2007)
EUROCRYPT
, vol.4515
, pp. 210-227
-
-
Boyen, X.1
-
12
-
-
38049146172
-
Batch verification of short signatures
-
M. Naor, Lecture Notes in Computer Science Springer
-
J. Camenisch, S. Hohenberger, and M.Ø. Pedersen Batch verification of short signatures M. Naor, EUROCRYPT Lecture Notes in Computer Science vol. 4515 2007 Springer 246 263
-
(2007)
EUROCRYPT
, vol.4515
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen M.Ø3
-
13
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
M.K. Franklin, Lecture Notes in Computer Science Springer
-
J. Camenisch, and A. Lysyanskaya Signature schemes and anonymous credentials from bilinear maps M.K. Franklin, CRYPTO Lecture Notes in Computer Science vol. 3152 2004 Springer 56 72
-
(2004)
CRYPTO
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
35248844436
-
An identity-based signature from Gap Diffie-Hellman groups
-
Y. Desmedt, Lecture Notes in Computer Science Springer
-
J.C. Cha, and J.H. Cheon An identity-based signature from Gap Diffie-Hellman groups Y. Desmedt, Public key cryptography Lecture Notes in Computer Science vol. 2567 2003 Springer 18 30
-
(2003)
Public Key Cryptography
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
15
-
-
84948970342
-
Designated confirmer signatures
-
A.D. Santis, Lecture Notes in Computer Science Springer
-
D. Chaum Designated confirmer signatures A.D. Santis, Eurocrypt Lecture Notes in Computer Science vol. 950 1994 Springer 86 91
-
(1994)
Eurocrypt
, vol.950
, pp. 86-91
-
-
Chaum, D.1
-
16
-
-
0010252194
-
Undeniable signatures
-
G. Brassard, Lecture Notes in Computer Science Springer
-
D. Chaum, and H.V. Antwerpen Undeniable signatures G. Brassard, Crypto Lecture Notes in Computer Science vol. 435 1989 Springer 212 216
-
(1989)
Crypto
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Antwerpen, H.V.2
-
17
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
D. Gollmann, J.-L. Lanet, J. Iguchi-Cartigny, Lecture Notes in Computer Science Springer Also available at
-
B. Chevallier-Mames, J.-S. Coron, N. McCullagh, D. Naccache, and M. Scott Secure delegation of elliptic-curve pairing D. Gollmann, J.-L. Lanet, J. Iguchi-Cartigny, CARDIS Lecture Notes in Computer Science vol. 6035 2010 Springer 24 35 Also available at: http://eprint.iacr.org/2005/150
-
(2010)
CARDIS
, vol.6035
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.-S.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
19
-
-
33745818483
-
Security-mediated certificateless cryptography
-
M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Lecture Notes in Computer Science Springer
-
S.S.M. Chow, C. Boyd, and J.M.G. Nieto Security-mediated certificateless cryptography M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Public key cryptography Lecture Notes in Computer Science vol. 3958 2006 Springer 508 524
-
(2006)
Public Key Cryptography
, vol.3958
, pp. 508-524
-
-
Chow, S.S.M.1
Boyd, C.2
Nieto, J.M.G.3
-
20
-
-
84863238100
-
Dynamic secure cloud storage with provenance
-
D. Naccache, Lecture Notes in Computer Science Springer
-
S.S.M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R.H. Deng Dynamic secure cloud storage with provenance D. Naccache, Cryptography and security Lecture Notes in Computer Science vol. 6805 2012 Springer 442 464
-
(2012)
Cryptography and Security
, vol.6805
, pp. 442-464
-
-
Chow, S.S.M.1
Chu, C.-K.2
Huang, X.3
Zhou, J.4
Deng, R.H.5
-
21
-
-
79951807252
-
Non-interactive confirmer signatures
-
A. Kiayias, Lecture Notes in Computer Science Springer
-
S.S.M. Chow, and K. Haralambiev Non-interactive confirmer signatures A. Kiayias, CT-RSA Lecture Notes in Computer Science vol. 6558 2011 Springer 49 64
-
(2011)
CT-RSA
, vol.6558
, pp. 49-64
-
-
Chow, S.S.M.1
Haralambiev, K.2
-
22
-
-
84863469103
-
SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment
-
F. Bao, P. Samarati, J. Zhou, Lecture Notes in Computer Science Springer
-
S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.M. Yiu SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment F. Bao, P. Samarati, J. Zhou, ACNS Lecture Notes in Computer Science vol. 7341 2012 Springer 526 543
-
(2012)
ACNS
, vol.7341
, pp. 526-543
-
-
Chow, S.S.M.1
He, Y.J.2
Hui, L.C.K.3
Yiu, S.M.4
-
23
-
-
79956031055
-
Identity-based online/offline key encapsulation and encryption
-
R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ACM
-
S.S.M. Chow, J.K. Liu, and J. Zhou Identity-based online/offline key encapsulation and encryption R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ASIACCS 2011 ACM 52 60
-
(2011)
ASIACCS
, pp. 52-60
-
-
Chow, S.S.M.1
Liu, J.K.2
Zhou, J.3
-
24
-
-
52149106246
-
General certificateless encryption and timed-release encryption
-
R. Ostrovsky, R.D. Prisco, I. Visconti, Lecture Notes in Computer Science Springer
-
S.S.M. Chow, V. Roth, and E.G. Rieffel General certificateless encryption and timed-release encryption R. Ostrovsky, R.D. Prisco, I. Visconti, SCN Lecture Notes in Computer Science vol. 5229 2008 Springer 126 143
-
(2008)
SCN
, vol.5229
, pp. 126-143
-
-
Chow, S.S.M.1
Roth, V.2
Rieffel, E.G.3
-
25
-
-
26444540788
-
Efficient identity based ring signature
-
J. Ioannidis, A.D. Keromytis, M. Yung, Lecture Notes in Computer Science
-
S.S.M. Chow, S.-M. Yiu, and L.C.K. Hui Efficient identity based ring signature J. Ioannidis, A.D. Keromytis, M. Yung, ACNS Lecture Notes in Computer Science vol. 3531 2005 499 512
-
(2005)
ACNS
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
26
-
-
79956000167
-
Secure mobile subscription of sensor-encrypted data
-
R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ACM
-
C-K Chu, W.T. Zhu, S.S.M. Chow, J. Zhou, and R.H. Deng Secure mobile subscription of sensor-encrypted data R. Sandhu, D.S. Wong, B. Cheung, L.C.K. Hui, ASIACCS 2011 ACM 228 237
-
(2011)
ASIACCS
, pp. 228-237
-
-
Chu, C.-K.1
Zhu, W.T.2
Chow, S.S.M.3
Zhou, J.4
Deng, R.H.5
-
27
-
-
38149117029
-
Identity-based broadcast encryption with constant size Ciphertexts and private keys
-
K. Kurosawa, Lecture Notes in Computer Science Springer
-
C. Delerablée Identity-based broadcast encryption with constant size Ciphertexts and private keys K. Kurosawa, ASIACRYPT Lecture Notes in Computer Science vol. 4833 2007 Springer 200 215
-
(2007)
ASIACRYPT
, vol.4833
, pp. 200-215
-
-
Delerablée, C.1
-
28
-
-
0033879372
-
Complexity and fast algorithms for multiexponentiations
-
V.S. Dimitrov, G.A. Jullien, and W.C. Miller Complexity and fast algorithms for multiexponentiations IEEE Trans Comput 49 2 2000 141 147
-
(2000)
IEEE Trans Comput
, vol.49
, Issue.2
, pp. 141-147
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
29
-
-
67650224819
-
Practical short signature batch verification
-
M. Fischlin, Lecture Notes in Computer Science Springer
-
A.L. Ferrara, M. Green, S. Hohenberger, and M.Ø. Pedersen Practical short signature batch verification M. Fischlin, CT-RSA Lecture Notes in Computer Science vol. 5473 2009 Springer 309 324
-
(2009)
CT-RSA
, vol.5473
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Pedersen M.Ø4
-
30
-
-
33646773954
-
Server-aided verification: Theory and practice
-
B.K. Roy, Lecture Notes in Computer Science Springer
-
M. Girault, and D. Lefranc Server-aided verification: theory and practice B.K. Roy, ASIACRYPT Lecture Notes in Computer Science vol. 3788 2005 Springer 605 623
-
(2005)
ASIACRYPT
, vol.3788
, pp. 605-623
-
-
Girault, M.1
Lefranc, D.2
-
31
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM J Comput 17 2 1998 281 308
-
(1998)
SIAM J Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
32
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
K. Nyberg, H.M. Heys, Lecture Notes in Computer Science Springer
-
F. Hess Efficient identity based signature schemes based on pairings K. Nyberg, H.M. Heys, Selected areas in cryptography Lecture Notes in Computer Science vol. 2595 2002 Springer 310 324
-
(2002)
Selected Areas in Cryptography
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
34
-
-
33646839305
-
Short undeniable signatures without random oracles: The missing link
-
S. Maitra, C.E.V. Madhavan, R. Venkatesan, Lecture Notes in Computer Science Springer
-
F. Laguillaumie, and D. Vergnaud Short undeniable signatures without random oracles: the missing link S. Maitra, C.E.V. Madhavan, R. Venkatesan, Indocrypt Lecture Notes in Computer Science vol. 3797 2005 Springer 283 296
-
(2005)
Indocrypt
, vol.3797
, pp. 283-296
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
35
-
-
33746066354
-
Sequential aggregate signatures and multisignatures without random oracles
-
S. Vaudenay, Lecture Notes in Computer Science Springer
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters Sequential aggregate signatures and multisignatures without random oracles S. Vaudenay, EUROCRYPT Lecture Notes in Computer Science vol. 4004 2006 Springer 465 485
-
(2006)
EUROCRYPT
, vol.4004
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
37
-
-
72749106279
-
Algorithms for multi-exponentiation
-
S. Vaudenay, A.M. Youssef, Lecture Notes in Computer Science Springer
-
B. Möller Algorithms for multi-exponentiation S. Vaudenay, A.M. Youssef, Selected areas in cryptography Lecture Notes in Computer Science vol. 2259 2001 Springer 165 180
-
(2001)
Selected Areas in Cryptography
, vol.2259
, pp. 165-180
-
-
Möller, B.1
-
38
-
-
24944554962
-
Fuzzy identity-based encryption
-
R. Cramer, Lecture Notes in Computer Science Springer
-
A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, EUROCRYPT Lecture Notes in Computer Science vol. 3494 2005 Springer 457 473
-
(2005)
EUROCRYPT
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
39
-
-
33744928902
-
Enhanced aggregate signatures from pairings
-
D. Feng, D. Lin, M. Yung, Lecture Notes in Computer Science Springer
-
Z. Shao Enhanced aggregate signatures from pairings D. Feng, D. Lin, M. Yung, CISC Lecture Notes in Computer Science vol. 3822 2005 Springer 140 149
-
(2005)
CISC
, vol.3822
, pp. 140-149
-
-
Shao, Z.1
-
40
-
-
38149111147
-
Batch pairing delegation
-
A. Miyaji, H. Kikuchi, K. Rannenberg, Lecture Notes in Computer Science Springer
-
P.P. Tsang, S.S.M. Chow, and S.W. Smith Batch pairing delegation A. Miyaji, H. Kikuchi, K. Rannenberg, IWSEC Lecture Notes in Computer Science vol. 4752 2007 Springer 74 90
-
(2007)
IWSEC
, vol.4752
, pp. 74-90
-
-
Tsang, P.P.1
Chow, S.S.M.2
Smith, S.W.3
-
41
-
-
79952985411
-
Comment on Wu et al.'s server-aided verification signature schemes
-
Z. Wang, L. Wang, Y. Yang, and Z. Hu Comment on Wu et al.'s server-aided verification signature schemes Int J Netw Security 10 2 2010 158 160
-
(2010)
Int J Netw Security
, vol.10
, Issue.2
, pp. 158-160
-
-
Wang, Z.1
Wang, L.2
Yang, Y.3
Hu, Z.4
-
42
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
R. Cramer, Lecture Notes in Computer Science Springer
-
B. Waters Efficient identity-based encryption without random oracles R. Cramer, EUROCRYPT Lecture Notes in Computer Science vol. 3494 2005 Springer 114 127
-
(2005)
EUROCRYPT
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
43
-
-
57049172488
-
Server-aided verification signatures: Definitions and new constructions
-
J. Baek, F. Bao, K. Chen, X. Lai, Lecture Notes in Computer Science Springer
-
W. Wu, Y. Mu, W. Susilo, and X. Huang Server-aided verification signatures: definitions and new constructions J. Baek, F. Bao, K. Chen, X. Lai, ProvSec Lecture Notes in Computer Science vol. 5324 2008 Springer 141 155
-
(2008)
ProvSec
, vol.5324
, pp. 141-155
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Huang, X.4
-
44
-
-
79952989011
-
Provably secure server-aided verification signatures
-
W. Wu, Y. Mu, W. Susilo, and X. Huang Provably secure server-aided verification signatures Comput Math Appl 61 7 2011 1705 1723
-
(2011)
Comput Math Appl
, vol.61
, Issue.7
, pp. 1705-1723
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Huang, X.4
-
45
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
F. Bao, R.H. Deng, J. Zhou, Lecture Notes in Computer Science Springer
-
F. Zhang, R. Safavi-Naini, and W. Susilo An efficient signature scheme from bilinear pairings and its applications F. Bao, R.H. Deng, J. Zhou, Public key cryptography Lecture Notes in Computer Science vol. 2947 2004 Springer 277 290
-
(2004)
Public Key Cryptography
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|