-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption)
-
LNCS 1294. Springer-Verlag: Berlin
-
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+cost (encryption). In CRYPTO'1997LNCS 1294. Springer-Verlag: Berlin, 1997; 165-179.
-
(1997)
CRYPTO'1997
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
84946833891
-
How to leak a secret
-
LNCS 2248. Springer-Verlag: Berlin
-
Rivest L, Shamir A, Tauman Y. How to leak a secret In. In ASIACRYPTLNCS 2248. Springer-Verlag: Berlin, 2001; 552-565.
-
(2001)
ASIACRYPT
, pp. 552-565
-
-
Rivest, L.1
Shamir, A.2
Tauman, Y.3
-
3
-
-
84876815610
-
-
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive: Report 2003/104.
-
Zhang F, Safavi R, Lin C. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive: Report 2003/104.
-
-
-
Zhang, F.1
Safavi, R.2
Lin, C.3
-
4
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
LNCS 2442. Springer-Verlag: Berlin
-
Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In CRYPTO'02LNCS 2442. Springer-Verlag: Berlin, 2002; 465-480.
-
(2002)
CRYPTO'02
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
5
-
-
84876790864
-
-
ID-based ring signature and proxy ring signature schemes from bilinear pairings
-
Awasthi AK, Lal S. ID-based ring signature and proxy ring signature schemes from bilinear pairings. 2004, http://eprint.iacr.org/2004/184
-
(2004)
-
-
Awasthi, A.K.1
Lal, S.2
-
6
-
-
34247324841
-
Identity based anonymous designated ring signatures
-
Vancouver: British Columbia, Canada
-
Chen YQ, Susilo W, Mu Y. Identity based anonymous designated ring signatures. In IWCMC'06. Vancouver: British Columbia, Canada, 2006; 189-194.
-
(2006)
IWCMC'06
, pp. 189-194
-
-
Chen, Y.Q.1
Susilo, W.2
Mu, Y.3
-
7
-
-
0040712314
-
How to construct efficient signcryption scheme on elliptic curves
-
Elsevier: North-Holland
-
Zheng Y, Imai H. How to construct efficient signcryption scheme on elliptic curves. In Information Processing LettersElsevier: North-Holland, 1998; 277-233.
-
(1998)
Information Processing Letters
, pp. 277-233
-
-
Zheng, Y.1
Imai, H.2
-
8
-
-
84937414347
-
Identification, signature and signcrypiton using high order residues modulo an RSA composite
-
LNCS 1992. Springer-Verlag: Berlin
-
Zheng Y. Identification, signature and signcrypiton using high order residues modulo an RSA composite. In PKC01LNCS 1992. Springer-Verlag: Berlin, 2001; 48-63.
-
(2001)
PKC01
, pp. 48-63
-
-
Zheng, Y.1
-
9
-
-
84947929166
-
Signcryption and its applications in efficient public key solutions
-
LNCS 1396. Springer-Verlag: Berlin
-
Zheng Y. Signcryption and its applications in efficient public key solutions. In Information SecurityLNCS 1396. Springer-Verlag: Berlin, 1998; 291-312.
-
(1998)
Information Security
, pp. 291-312
-
-
Zheng, Y.1
-
11
-
-
80055097829
-
-
Identity-based multi-receiver threshold signcryption scheme. Security and Communication Networks
-
Qin H, Dai Y, Wang Z. Identity-based multi-receiver threshold signcryption scheme. Security and Communication Networks. 2010, http://onlinelibrary.wiley.com/doi/10.1002/sec.259/abstract
-
(2010)
-
-
Qin, H.1
Dai, Y.2
Wang, Z.3
-
13
-
-
84876816531
-
-
Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008/394
-
Li J, Kim K. Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008/394, 2008.
-
(2008)
-
-
Li, J.1
Kim, K.2
-
14
-
-
24944554962
-
Fuzzy identity-based encryption
-
LNCS3494. Springer-Verlag: Berlin
-
Sahai A, Waters B. Fuzzy identity-based encryption. In EUROCRYPTLNCS3494. Springer-Verlag: Berlin, 2005; 457-473.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
15
-
-
34547273527
-
-
Attribute-based encryption for fine-grained access control of encrypted data. CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA
-
Goyal V, Pandey A, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006; 89-98.
-
(2006)
, pp. 89-98
-
-
Goyal, V.1
Pandey, A.2
Sahai, A.3
Waters, B.4
-
16
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
LNCS 4965. Springer-Verlag: Berlin
-
Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPTLNCS 4965. Springer-Verlag: Berlin, 2008; 146-162.
-
(2008)
EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
74049120601
-
-
Attribute-based encryption with nonmonotonic access structures. CCS'07 Proceedings of the 14th ACM Conference on Computer and Communications Security. Whistler, Canada
-
Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with nonmonotonic access structures. CCS'07 Proceedings of the 14th ACM Conference on Computer and Communications Security. Whistler, Canada, 2007; 195-203.
-
(2007)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
18
-
-
34548731375
-
-
Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. USA, DC, 321-334.
-
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. USA, DC, 2007; 321-334.
-
(2007)
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
LNCS 5126. Springer-Verlag: Berlin
-
Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Automata, Languages and ProgrammingLNCS 5126. Springer-Verlag: Berlin, 2008; 579-591.
-
(2008)
Automata,Languages and Programming
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
20
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
LNCS 5037. Springer-Verlag: Berlin
-
Nishide T, Yoneyama K, Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures. In ACNSLNCS 5037. Springer-Verlag: Berlin, 2008; 111-129.
-
(2008)
ACNS
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
21
-
-
38049078557
-
Multi-authority attribute based encryption
-
LNCS 4392. Springer-Verlag: Berlin
-
Chase M. Multi-authority attribute based encryption. In TCC 2007LNCS 4392. Springer-Verlag: Berlin, 2007; 515-534.
-
(2007)
TCC 2007
, pp. 515-534
-
-
Chase, M.1
-
22
-
-
0346265013
-
Forking lemmas for ring signature scheme
-
LNCS 2094. Springer-Verlag: Berlin
-
Herranz J, Saez G. Forking lemmas for ring signature scheme. In Progress in CryptologyLNCS 2094. Springer-Verlag: Berlin, 2003; 266-279.
-
(2003)
Progress in Cryptology
, pp. 266-279
-
-
Herranz, J.1
Saez, G.2
|