-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
M. Abe, M. Ohkubo, and K. Suzuki, "1-Out-of-n Signatures from a Variety of Keys, " Proc. Eighth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '02), pp. 415-432, 2002.
-
(2002)
Proc. Eighth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '02)
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
0028446824
-
A new dynamic voting algorithm for distributed database systems
-
June
-
N.R. Adam, "A New Dynamic Voting Algorithm for Distributed Database Systems, " IEEE Trans. Knowledge and Data Eng., vol. 6, no. 3, pp. 470-478, June 1994.
-
(1994)
IEEE Trans. Knowledge and Data Eng
, vol.6
, Issue.3
, pp. 470-478
-
-
Adam, N.R.1
-
3
-
-
33746190818
-
Short linkable ring signatures revisited
-
Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
-
M.H. Au, S.S.M. Chow, W. Susilo, and P.P. Tsang, "Short Linkable Ring Signatures Revisited, " Proc. Third European Conf. Public Key Infrastructure: Theory and Practice (EuroPKI '06), pp. 101-115, 2006. (Pubitemid 44097506)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4043
, pp. 101-115
-
-
Au, M.H.1
Chow, S.S.M.2
Susilo, W.3
Tsang, P.P.4
-
4
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, " Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), pp. 614-629, 2003.
-
(2003)
Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03)
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
7
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, " Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), pp. 416-432, 2003.
-
(2003)
Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03)
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
8
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology - CRYPTO '97
-
J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups (Extended Abstract), " Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 410-424, 1997. (Pubitemid 127112569)
-
(1997)
Lecture notes in computer science
, Issue.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
11
-
-
0041848378
-
Stability analysis of regional and national voting schemes by a continuous model
-
July-Aug
-
L. Chen and N. Tokuda, "Stability Analysis of Regional and National Voting Schemes by a Continuous Model, " IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1037-1042, July-Aug. 2003.
-
(2003)
IEEE Trans. Knowledge and Data Eng
, vol.15
, Issue.4
, pp. 1037-1042
-
-
Chen, L.1
Tokuda, N.2
-
12
-
-
33845246483
-
Ring signatures without random oracles
-
DOI 10.1145/1128817.1128861, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
S.S. Chow, J.K. Liu, V.K. Wei, and T.H. Yuen, "Ring Signatures without Random Oracles, " Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '06), pp. 297-302, 2006. (Pubitemid 46644747)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 297-302
-
-
Chow, S.S.M.1
Wei, V.K.2
Liu, J.K.3
Yuen, T.H.4
-
14
-
-
26444540788
-
Efficient identity based ring signature
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
S.S.M. Chow, S.-M. Yiu, and L.C.K. Hui, "Efficient Identity Based Ring Signature, " Proc. Third Int'l Conf. Applied Cryptography and Network Security (ACNS '05), pp. 499-512, 2005. (Pubitemid 41422135)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
15
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup, "Anonymous Identification in Ad Hoc Groups, " Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), pp. 609-626, 2004.
-
(2004)
Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '04)
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
16
-
-
78149266057
-
Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses
-
Dec
-
Q. Feng, Y.L. Sun, L. Liu, Y. Yang, and Y. Dai, "Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses, " IEEE Trans. Knowledge and Data Eng., vol. 22, no. 12, pp. 1766-1780, Dec. 2010.
-
(2010)
IEEE Trans. Knowledge and Data Eng
, vol.22
, Issue.12
, pp. 1766-1780
-
-
Feng, Q.1
Sun, Y.L.2
Liu, L.3
Yang, Y.4
Dai, Y.5
-
19
-
-
46649118688
-
Ring signature with weak linkability and its applications
-
Aug
-
I.R. Jeong, J.O. Kwon, and D.H. Lee, "Ring signature with Weak Linkability and Its Applications, " IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1145-1148, Aug. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng
, vol.20
, Issue.8
, pp. 1145-1148
-
-
Jeong, I.R.1
Kwon, J.O.2
Lee, D.H.3
-
20
-
-
79960915041
-
Optimal service pricing for a cloud cache
-
Set
-
V. Kantere, D. Dash, G. François, S. Kyriakopoulou, and A. Ailamaki, "Optimal Service Pricing for a Cloud Cache, " IEEE Trans. Knowledge and Data Eng., vol. 23, no. 9, pp. 1345-1358, Sept. 2011.
-
(2011)
IEEE Trans. Knowledge and Data Eng
, vol.23
, Issue.9
, pp. 1345-1358
-
-
Kantere, V.1
Dash, D.2
François, G.3
Kyriakopoulou, S.4
Ailamaki, A.5
-
21
-
-
33645420820
-
A separable threshold ring signature scheme
-
J.K. Liu, V.K. Wei, and D.S. Wong, "A Separable Threshold Ring Signature Scheme, " Proc. Sixth Int'l Conf. Information Security and Cryptology (ICISC '03), pp. 352-369, 2003.
-
(2003)
Proc. Sixth Int'l Conf. Information Security and Cryptology (ICISC '03)
, pp. 352-369
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
23
-
-
24944589673
-
Linkable ring signatures: Security models and new schemes
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
-
J.K. Liu and D.S. Wong, "Linkable Ring Signatures: Security Models and New Schemes, " Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '05), pp. 614-623, 2005. (Pubitemid 41313741)
-
(2005)
Lecture Notes in Computer Science
, vol.3481
, Issue.II
, pp. 614-623
-
-
Liu, J.K.1
Wong, D.S.2
-
24
-
-
81055144575
-
Forward secure ring signature without random oracles
-
J.K. Liu, T.H. Yuen, and J. Zhou, "Forward Secure Ring Signature Without Random Oracles, " Proc. 13th Int'l Conf. Information and Comm. Security (ICICS '11), pp. 1-14, 2011.
-
(2011)
Proc. 13th Int'l Conf. Information and Comm. Security (ICICS '11)
, pp. 1-14
-
-
Liu, J.K.1
Yuen, T.H.2
Zhou, J.3
-
25
-
-
79960911439
-
State monitoring in cloud datacenters
-
Set
-
S. Meng, L. Liu, and T. Wang, "State Monitoring in Cloud Datacenters, " IEEE Trans. Knowledge and Data Eng., vol. 23, no. 9, pp. 1328-1344, Sept. 2011.
-
(2011)
IEEE Trans. Knowledge and Data Eng
, vol.23
, Issue.9
, pp. 1328-1344
-
-
Meng, S.1
Liu, L.2
Wang, T.3
-
26
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval and J. Stern, "Security Proofs for Signature Schemes, " Proc. 15th Ann. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '96), pp. 387-398, 1996. (Pubitemid 126071081)
-
(1996)
Lecture notes in computer science
, Issue.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
84946833891
-
How to Leak a Secret
-
Advances in Cryptology - ASIACRYPT 2001
-
R.L. Rivest, A. Shamir, and Y. Tauman, "How to Leak a Secret, " Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01), pp. 552-565, 2001. (Pubitemid 33371206)
-
(2002)
Lecture notes in computer science
, Issue.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
29
-
-
78449233611
-
A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity
-
P.P. Tsang, M.H. Au, J.K. Liu, W. Susilo, and D.S. Wong, "A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity, " Proc. Fourth Int'l Conf. Provable Security (ProvSec '10), pp. 166-183, 2010.
-
(2010)
Proc. Fourth Int'l Conf. Provable Security (ProvSec '10)
, pp. 166-183
-
-
Tsang, P.P.1
Au, M.H.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
-
30
-
-
24644461219
-
Short linkable ring signatures for E-voting, E-cash and attestation
-
Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
-
P.P. Tsang and V.K. Wei, "Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation, " Proc. First Int'l Conf. Information Security Practice and Experience (ISPEC '05), pp. 48- 60, 2005. (Pubitemid 41273777)
-
(2005)
Lecture Notes in Computer Science
, vol.3439
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
31
-
-
24644503853
-
Separable linkable threshold ring signatures
-
P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S. Wong, "Separable Linkable Threshold Ring Signatures, " Proc. Fifth Int'l Conf. Cryptology in India (INDOCRYPT '04), pp. 384-398, 2004. (Pubitemid 39748322)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
32
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
July/Aug
-
C. Wang, K. Ren, W. Lou, and J. Li, "Toward Publicly Auditable Secure Cloud Data Storage Services, " IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
33
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters, "Efficient Identity-Based Encryption Without Random Oracles, " Proc. 24th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), pp. 114-127, 2005. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
34
-
-
0142218983
-
On the rs-code construction of ring signature schemes and a threshold setting of rst
-
D.S. Wong, K. Fung, J.K. Liu, and V.K. Wei, "On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST, " Proc. Fifth Int'l Conf. Information and Comm. Security (ICICS '03), pp. 34-46, 2003.
-
(2003)
Proc. Fifth Int'l Conf. Information and Comm. Security (ICICS '03)
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
35
-
-
79955983400
-
Threshold ring signatures without random oracles
-
T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou, "Threshold Ring Signatures Without Random Oracles, " Proc. Sixth ACM Symp. Information, Computer and Comm. Security (ASIACCS '11), pp. 261-267, 2011.
-
(2011)
Proc. Sixth ACM Symp. Information, Computer and Comm. Security (ASIACCS '11)
, pp. 261-267
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
36
-
-
84875690586
-
Efficient linkable and/or threshold ring signature without random oracles
-
T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou, "Efficient Linkable and/or Threshold Ring Signature Without Random Oracles, " Computer J., vol. 56, no. 4, pp. 407-421, 2013.
-
(2013)
Computer J
, vol.56
, Issue.4
, pp. 407-421
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
38
-
-
38149056458
-
Linkable ring signatures from linear feedback shift register
-
D. Zheng, X. Li, K. Chen, and J. Li, "Linkable Ring Signatures from Linear Feedback Shift Register, " Proc. Conf. Emerging Direction in Embedded and Ubiquitous Computing (EUC '07), pp. 716-727, 2007.
-
(2007)
Proc. Conf. Emerging Direction in Embedded and Ubiquitous Computing (EUC '07)
, pp. 716-727
-
-
Zheng, D.1
Li, X.2
Chen, K.3
Li, J.4
-
39
-
-
80053516153
-
Enforcing role- based access control for secure data storage in the cloud
-
L. Zhou, V. Varadharajan, and M. Hitchens, "Enforcing Role- Based Access Control for Secure Data Storage in the Cloud, " Comput. J., vol. 54, no. 10, pp. 1675-1687, 2011.
-
(2011)
Comput. J
, vol.54
, Issue.10
, pp. 1675-1687
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
|