-
2
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
M. Bellare and J. Garay, Fast batch verification for modular exponentiation and digital signatures, in Advances in Cryptology-EUROCRYPT, 1998, pp. 236-250.
-
(1998)
Advances in Cryptology-EUROCRYPT
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
-
4
-
-
38049146172
-
Batch verification of short signature
-
J. Camenisch, S. Hohenberger, and M. Pedersen, Batch verification of short signature, in Advances in Cryptology-EUROCRYPT, 2007, pp. 246-263.
-
(2007)
Advances in Cryptology-EUROCRYPT
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
5
-
-
38049168395
-
Security analysis of some batch verifying signatures from pairings
-
T. Cao, D. Lin, and R. Xue, Security analysis of some batch verifying signatures from pairings, International Journal of Network Security 3(2) (2006) 138-143.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 138-143
-
-
Cao, T.1
Lin, D.2
Xue, R.3
-
6
-
-
79952987257
-
A new provably secure certificateless short signature scheme
-
K. Choi, J. Park, and D. Lee, A new provably secure certificateless short signature scheme, Computers & Mathematics with Applications 61(7) (2011) 1760-1768.
-
(2011)
Computers & Mathematics with Applications
, vol.61
, Issue.7
, pp. 1760-1768
-
-
Choi, K.1
Park, J.2
Lee, D.3
-
7
-
-
71149116424
-
An efficient identity-based signature scheme with batch verifications
-
(22)
-
S. Cui, P. Duan, and C. Chan, An efficient identity-based signature scheme with batch verifications, in Proceedings of the 1st International Conference on Scalable information systems, INFOSCALE, 2006, pp. 1-6(22)
-
(2006)
Proceedings of the 1st International Conference on Scalable Information Systems, INFOSCALE
, pp. 1-6
-
-
Cui, S.1
Duan, P.2
Chan, C.3
-
8
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
H. Du and Q. Wen, Efficient and provably-secure certificateless short signature scheme from bilinear pairings, Computer Standards & Interfaces 31(2) (2009) 390-394.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.2
, pp. 390-394
-
-
Du, H.1
Wen, Q.2
-
9
-
-
67650224819
-
Practical short signature batch verification
-
A. Ferrara, M. Green, S. Hobenberger, and M. Pedersen, Practical short signature batch verification, in Proceedings of the The Cryptographers' Track at the RSA Conference on Topics in Cryptology, CT-RSA, 2009, pp. 309-324.
-
(2009)
Proceedings of the The Cryptographers' Track at the RSA Conference on Topics in Cryptology, CT-RSA
, pp. 309-324
-
-
Ferrara, A.1
Green, M.2
Hobenberger, S.3
Pedersen, M.4
-
11
-
-
77949297993
-
Batch verification for certificateless signature schemes
-
M. Geng, and F Zhang, Batch verification for certificateless signature schemes, in Proceedings of International Conference on Computational Intelligence and Security, CIS, 2009, pp. 288-292.
-
(2009)
Proceedings of International Conference on Computational Intelligence and Security, CIS
, pp. 288-292
-
-
Geng, M.1
Zhang, F.2
-
13
-
-
33646852592
-
An efficient certificateless signature scheme
-
M. Gorantla, and A. Saxena, An efficient certificateless signature scheme, in Proceedings of International Conference on Computational Intelligence and Security, CIS, 2005, pp. 110-116.
-
(2005)
Proceedings of International Conference on Computational Intelligence and Security, CIS
, pp. 110-116
-
-
Gorantla, M.1
Saxena, A.2
-
14
-
-
58049101125
-
Efficient batch verification of short signatures for a single-signer setting without random oracles
-
F Guo, Y. Mu, and Z. Chen, Efficient batch verification of short signatures for a single-signer setting without random oracles, in Proceedings of International Workshop on Security, IWSEC, 2008, pp. 49-63.
-
(2008)
Proceedings of International Workshop on Security, IWSEC
, pp. 49-63
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
15
-
-
11744310046
-
Batch verifying multiple RSA digital signatures
-
L. Harn, Batch verifying multiple RSA digital signatures, Electronics Letters 34(12) (1998) 1219-1220.
-
(1998)
Electronics Letters
, vol.34
, Issue.12
, pp. 1219-1220
-
-
Harn, L.1
-
16
-
-
33846219987
-
Certificateless signature: A new security model and an improved generic construction
-
B. Hu, D. Wong, Z. Zhang, and X. Deng, Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptography 42(2) (2007) 109-126.
-
(2007)
Des. Codes Cryptography
, vol.42
, Issue.2
, pp. 109-126
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
17
-
-
33744786523
-
On the security of certificateless signature schemes from asiacrypt 2003
-
X. Huang, W. Susilo, Y. Mu, and F Zhang, On the Security of Certificateless Signature Schemes from Asiacrypt 2003, in Proceedings of International Conference on Cryptology and Network Security, CANS, 2005, pp. 13-25.
-
(2005)
Proceedings of International Conference on Cryptology and Network Security, CANS
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
18
-
-
84956999402
-
Two simple batch verifying multiple digital signatures
-
M. Hwang, C. Lee, and Y Tang, Two simple batch verifying multiple digital signatures, in Proceedings of International Conference on Information and Communications Security, ICICS, 2001, pp. 233-237.
-
(2001)
Proceedings of International Conference on Information and Communications Security, ICICS
, pp. 233-237
-
-
Hwang, M.1
Lee, C.2
Tang, Y.3
-
19
-
-
80054061233
-
Batch verification and finding invalid signatures in a group signature scheme
-
K. Kim, I. Yie, S. Lim, and D. Nyang, Batch verification and finding invalid signatures in a group signature scheme, International Journal of Network Security 13(2) (2011) 61-70.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.2
, pp. 61-70
-
-
Kim, K.1
Yie, I.2
Lim, S.3
Nyang, D.4
-
20
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S. Vanstone, The state of elliptic curve cryptography, Des. Codes Cryptography 19(2-3) (2000), 173-193.
-
(2000)
Des. Codes Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
21
-
-
18244396341
-
Certificateless signature and proxy signature schemes from bilinear pairings
-
X. Li, K. Chen, and L. Sun, Certificateless signature and proxy signature schemes from bilinear pairings, Lithuanian Mathematical Journal 45(1) (2005) 76-83.
-
(2005)
Lithuanian Mathematical Journal
, vol.45
, Issue.1
, pp. 76-83
-
-
Li, X.1
Chen, K.2
Sun, L.3
-
22
-
-
84944878354
-
-
CRC Press LLC, Boca Raton
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of applied cryptography, CRC Press LLC, Boca Raton, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
23
-
-
0041863206
-
Can D. S. A. be improved? Complexity trade-offs with the digital signature standard
-
D. Naccache, D. M'Raihi, S. Vaudenay, and D. Raphaeli, Can D. S. A. be improved? complexity trade-offs with the digital signature standard, in Advances in Cryptology-EUROCRYPT, 1994, pp. 77-85.
-
(1994)
Advances in Cryptology-EUROCRYPT
, pp. 77-85
-
-
Naccache, D.1
M'Raihi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
24
-
-
77953977655
-
Research on pairing-based batch verification
-
X. Qin, S. Zhang, and L. Jia, Research on pairing-based batch verification, in Proceedings of International Conference on Communications and Mobile Computing, CMC, 2010, pp. 46-50.
-
(2010)
Proceedings of International Conference on Communications and Mobile Computing, CMC
, pp. 46-50
-
-
Qin, X.1
Zhang, S.2
Jia, L.3
-
25
-
-
84859548489
-
Strongly secure certificateless short signatures
-
R. Tso, X. Huang, and W. Susilo, Strongly secure certificateless short signatures, Journal of Systems and Software 85(6) (2012) 1409-1417.
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.6
, pp. 1409-1417
-
-
Tso, R.1
Huang, X.2
Susilo, W.3
-
26
-
-
77955353204
-
Efficient group signature scheme supporting batch verification for securing vehicular networks
-
A. Wasef and X. Shen, Efficient group signature scheme supporting batch verification for securing vehicular networks, in Proceedings of International Conference on Communications, ICC, 2010, pp. 1-5.
-
(2010)
Proceedings of International Conference on Communications, ICC
, pp. 1-5
-
-
Wasef, A.1
Shen, X.2
-
27
-
-
84862932814
-
On a group signature scheme supporting batch verification for vehicular networks
-
L. Wei, J. Liu, and T. Zhu, On a group signature scheme supporting batch verification for vehicular networks, in Proceedings of International Conference on Multimedia Information Networking and Security, MINES, 2011, pp. 436-440.
-
(2011)
Proceedings of International Conference on Multimedia Information Networking and Security, MINES
, pp. 436-440
-
-
Wei, L.1
Liu, J.2
Zhu, T.3
-
28
-
-
33749421203
-
An efficient certificateless signature scheme
-
W. Yap, S. Heng, and B. Goi, An efficient certificateless signature scheme, in Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing, EUC, 2006, pp. 322-331.
-
(2006)
Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing, EUC
, pp. 322-331
-
-
Yap, W.1
Heng, S.2
Goi, B.3
-
29
-
-
0029342134
-
Improved digital signature suitable for batch verification
-
S. Yen and C. Laih, Improved digital signature suitable for batch verification, IEEE Transactions on Computers 44(7) (1995) 957-959.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.7
, pp. 957-959
-
-
Yen, S.1
Laih, C.2
-
30
-
-
24944445896
-
Batch verifications with ID-based signatures
-
H. Yoon, J. H. Cheon, and Y. Kim, Batch verifications with ID-based signatures, in Proceedings of International Conference on Information Security and Cryptology, ICISC, 2004, pp. 233-248.
-
(2004)
Proceedings of International Conference on Information Security and Cryptology, ICISC
, pp. 233-248
-
-
Yoon, H.1
Cheon, J.H.2
Kim, Y.3
-
31
-
-
84855615935
-
On batch verification with group testing for vehicular communications
-
C. Zhang, P. Ho, and J. Tapolcai, On batch verification with group testing for vehicular communications, Wireless Networks 17(8) (2011) 1851-1865.
-
(2011)
Wireless Networks
, vol.17
, Issue.8
, pp. 1851-1865
-
-
Zhang, C.1
Ho, P.2
Tapolcai, J.3
-
32
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, Securing mobile ad hoc networks with certificateless public keys, IEEE Transactions on Dependable and Secure Computing 3(4) (2006) 386-399.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
33
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
Z. Zhang, D. Wong, J. Xu, and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proceedings of International Conference on Applied Cryptography and Network Security, ACNS, 2006, pp. 293-308.
-
(2006)
Proceedings of International Conference on Applied Cryptography and Network Security, ACNS
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.2
Xu, J.3
Feng, D.4
-
34
-
-
38149132343
-
New efficient certificateless signature scheme
-
L. Zhang, F. Zhang, F. Zhang, New efficient certificateless signature scheme, in Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing, EUC, 2007, pp. 692-703.
-
(2007)
Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing, EUC
, pp. 692-703
-
-
Zhang, L.1
Zhang, F.2
Zhang, F.3
|