-
3
-
-
84946840347
-
Short signatures from the weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology-ASIACRYPT 2001, Lecture Notes in Computer Science 2248, pages. 514-532. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-ASIACRYPT 2001, Lecture Notes in Computer Science 2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
11244339991
-
Secure proxy signature scheme for delegation of signing rights
-
A. Boldyreva, A. Palacio and B. Warinschi. Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, available at http://eprint.iacr.org/2003/096/, 2003.
-
(2003)
IACR EPrint Archive
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
5
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and rabin
-
Springer-Verlag, Berlin
-
M. Bellare and P. Rogaway. The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. Advances in Cryptology - Eurocrypt'96, Lecture Notes in Computer Science 950, pages 399-416, Springer-Verlag, Berlin, 1996.
-
(1996)
Advances in Cryptology - Eurocrypt'96, Lecture Notes in Computer Science 950
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84886019414
-
Security analysis of the strong diffie-hellman problem
-
to appear
-
J. H. Cheon. Security analysis of the strong diffie-hellman problem. EUROCRYPT 2006, to appear.
-
(2006)
EUROCRYPT
-
-
Cheon, J.H.1
-
8
-
-
0023985465
-
A digital signature scheme secure against adaptively chosen message attacks
-
S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptively chosen message attacks. SIAM Journal on Computing, 17(2): 281-308, 1988
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
10
-
-
33744908066
-
A short proxy signature scheme: Efficient authentication in the ubiquitous world
-
Springer-Verlag
-
X. Huang, Y. Mu, W. Susilo, F. Zhang and X. Chen. A short proxy signature scheme: efficient authentication in the ubiquitous world. The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), Lecture Notes in Computer Science 3823, pages. 480-489, Springer-Verlag, 2005.
-
(2005)
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), Lecture Notes in Computer Science 3823
, pp. 480-489
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Zhang, F.4
Chen, X.5
-
12
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim and K. Kim. Strong proxy signature and its applications. In Proc of SCIS'01, pages. 603-08. 2001.
-
(2001)
Proc of SCIS'01
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
13
-
-
84958751721
-
Secure mobile agent using strong nondesignated proxy signature
-
Springer-Verlag
-
B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong nondesignated proxy signature. In Information Security and Privacy (ACISP01), Lecture Notes in Computer Science 2119, pages. 474-486. Springer-Verlag, 2001.
-
(2001)
Information Security and Privacy (ACISP01), Lecture Notes in Computer Science 2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
14
-
-
0010567510
-
Proxy signatures, revisited
-
Springer-Verlag
-
S. Kim, S. Park and D. Won. Proxy signatures, revisited. In Information and Communications Security (ICICS97), Lecture Notes in Computer Science 1334, pages. 223-232. Springer-Verlag, 1997.
-
(1997)
Information and Communications Security (ICICS97), Lecture Notes in Computer Science 1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
15
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep.
-
M. Mambo, K. Usuda and E. Okamoto. Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, No. 9, Sep., pages. 1338-1353, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
84948137719
-
Extended proxy signatures for smart cards
-
Springer Verlag
-
T. Okamoto, M. Tada, and E. Okamoto. Extended proxy signatures for smart cards. In ISW 99, Lecture Notes in Computer Science 1729, pages. 247-258, Springer Verlag, 1999.
-
(1999)
ISW 99, Lecture Notes in Computer Science 1729
, pp. 247-258
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
19
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer-Verlag
-
R. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pages. 114-127. Springer-Verlag, 2005.
-
(2005)
EUROCRYPT 2005, Lecture Notes in Computer Science 3494
, pp. 114-127
-
-
Waters, R.1
-
20
-
-
35048825374
-
Security analysis of some proxy signatures
-
Springer-Verlag
-
G. Wang, F. Bao, J. Zhou and Robert H. Deng. Security analysis of some proxy signatures. In ICICS 2003, Lecture Notes in Computer Science 2971, pages. 305-319. Springer-Verlag, 2003.
-
(2003)
ICICS 2003, Lecture Notes in Computer Science 2971
, pp. 305-319
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
22
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Springer-Verlag
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In Public Key Cryptography (PKC'04), Lecture Notes in Computer Science 2947, pages 277-290. Springer-Verlag, 2004.
-
(2004)
Public Key Cryptography (PKC'04), Lecture Notes in Computer Science 2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|