-
4
-
-
77749250150
-
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
-
Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, and Danfeng Yao Efficient signature schemes supporting redaction, pseudonymization, and data deidentification ASIACCS 08 2008 353 362
-
(2008)
ASIACCS 08
, pp. 353-362
-
-
Haber, S.1
Hatano, Y.2
Honda, Y.3
Horne, W.4
Miyazaki, K.5
Sander, T.6
Tezoku, S.7
Yao, D.8
-
5
-
-
67049155506
-
Security of sanitizable signatures revisited
-
LNCS
-
Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, and Florian Volk Security of sanitizable signatures revisited Public Key Cryptography LNCS vol. 5443 2009 317 336
-
(2009)
Public Key Cryptography
, vol.5443
, pp. 317-336
-
-
Brzuska, C.1
Fischlin, M.2
Freudenreich, T.3
Lehmann, A.4
Page, M.5
Schelbert, J.6
Schröder, D.7
Volk, F.8
-
7
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Springer LNCS
-
Dan Boneh, David Freeman, Jonathan Katz, and Brent Waters Signing a linear subspace: Signature schemes for network coding Public Key Cryptography - PKC 09 Springer LNCS vol. 5443 2009 68 87
-
(2009)
Public Key Cryptography - PKC 09
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
82955182557
-
Homomorphic signatures for polynomial functions
-
Cryptology ePrint Archive, Report 2011/018
-
Dan Boneh, and David Freeman Homomorphic signatures for polynomial functions Proc. of Eurocrypt 2011 Cryptology ePrint Archive, Report 2011/018
-
(2011)
Proc. of Eurocrypt
-
-
Boneh, D.1
Freeman, D.2
-
10
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
LNCS Cryptology ePrint Archive, Report 2010/453
-
Dan Boneh, and David Freeman Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures Proc. of PKC LNCS vol. 6571 2011 1 16 Cryptology ePrint Archive, Report 2010/453
-
(2011)
Proc. of PKC
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.2
-
11
-
-
79956016288
-
Bounded vector signatures and their applications
-
Lei Wei, Scott E. Coull, and Michael K. Reiter Bounded vector signatures and their applications ASIACCS 11 2011 277 285
-
(2011)
ASIACCS 11
, pp. 277-285
-
-
Wei, L.1
Coull, S.E.2
Reiter, M.K.3
-
12
-
-
84958749510
-
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
-
LNCS
-
Alejandro Hevia, and Daniele Micciancio The provable security of graph-based one-time signatures and extensions to algebraic signature schemes ASIACRYPT 02 LNCS vol. 2501 2002 379 396
-
(2002)
ASIACRYPT 02
, vol.2501
, pp. 379-396
-
-
Hevia, A.1
Micciancio, D.2
-
15
-
-
85081454697
-
Directed transitive signature scheme
-
LNCS
-
Xun Yi Directed transitive signature scheme CT-RSA 07 LNCS vol. 4377 2007 129144
-
(2007)
CT-RSA 07
, vol.4377
, pp. 129144
-
-
Yi, X.1
-
16
-
-
42149108421
-
A simple transitive signature scheme for directed trees
-
Gregory Neven A simple transitive signature scheme for directed trees Theoretical Computer Science 396 1-3 2008 277 282
-
(2008)
Theoretical Computer Science
, vol.396
, Issue.13
, pp. 277-282
-
-
Neven, G.1
-
19
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
A. Shamir On the generation of cryptographically strong pseudorandom sequences ACM Transactions on Computer Systems 1 1983 38 44
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, pp. 38-44
-
-
Shamir, A.1
|