-
1
-
-
35048873387
-
Identity-based chameleon hash and applications
-
LNCS Springer-Verlag
-
G. Ateniese, and B. de Medeiros Identity-based chameleon hash and applications FC 2004 LNCS vol. 3110 2004 Springer-Verlag 164 180
-
(2004)
FC 2004
, vol.3110 VOL.
, pp. 164-180
-
-
Ateniese, G.1
De Medeiros, B.2
-
2
-
-
23944526438
-
On the key exposure problem in chameleon hashes
-
LNCS Springer-Verlag
-
G. Ateniese, and B. de Medeiros On the key exposure problem in chameleon hashes SCN 2004 LNCS vol. 3352 2005 Springer-Verlag 165 179
-
(2005)
SCN 2004
, vol.3352 VOL.
, pp. 165-179
-
-
Ateniese, G.1
De Medeiros, B.2
-
4
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
LNCS Springer-Verlag
-
P. Barreto, H. Kim, B. Lynn, and M. Scott Efficient algorithms for pairing-based cryptosystems Advances in Cryptology-Crypto 2002 LNCS vol. 2442 2002 Springer-Verlag 354 368
-
(2002)
Advances in Cryptology-Crypto 2002
, vol.2442 VOL.
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS Springer-Verlag
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing Advances in Cryptology-Crypto 2001 LNCS vol. 2139 2001 Springer-Verlag 213 229
-
(2001)
Advances in Cryptology-Crypto 2001
, vol.2139 VOL.
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0000090958
-
The exact security of digital signatures-How to sign with RSA and Rabin
-
LNCS Springer-Verlag
-
M. Bellare, and P. Rogaway The exact security of digital signatures-How to sign with RSA and Rabin Advances in Cryptology-Eurocrypt 1996 LNCS vol. 1070 1996 Springer-Verlag 399 416
-
(1996)
Advances in Cryptology-Eurocrypt 1996
, vol.1070 VOL.
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
33646832774
-
Identity-based threshold decryption
-
LNCS Springer-Verlag
-
J. Baek, and Y. Zheng Identity-based threshold decryption PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 248 261
-
(2004)
PKC 2004
, vol.2947 VOL.
, pp. 248-261
-
-
Baek, J.1
Zheng, Y.2
-
9
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
LNCS Springer-Verlag
-
J. Cha, and J. Cheon An identity-based signature from gap Diffie-Hellman groups PKC 2003 LNCS vol. 2567 2003 Springer-Verlag 18 30
-
(2003)
PKC 2003
, vol.2567 VOL.
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
-
10
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
LNCS Springer-Verlag
-
D. Chaum Zero-knowledge undeniable signatures Advances in Cryptology-Eurocrypt 1990 LNCS vol. 473 1991 Springer-Verlag 458 464
-
(1991)
Advances in Cryptology-Eurocrypt 1990
, vol.473 VOL.
, pp. 458-464
-
-
Chaum, D.1
-
11
-
-
0002083808
-
Designated confirmer signatures
-
LNCS Springer-Verlag
-
D. Chaum Designated confirmer signatures Advances in Cryptology-Eurocrypt 1994 LNCS vol. 950 1994 Springer-Verlag 86 91
-
(1994)
Advances in Cryptology-Eurocrypt 1994
, vol.950 VOL.
, pp. 86-91
-
-
Chaum, D.1
-
13
-
-
84921068281
-
On the exact security of full domain hash
-
LNCS Springer-Verlag
-
J. Coron On the exact security of full domain hash Advances in Cryptology-Crypto 2000 LNCS vol. 1880 2000 Springer-Verlag 229 235
-
(2000)
Advances in Cryptology-Crypto 2000
, vol.1880 VOL.
, pp. 229-235
-
-
Coron, J.1
-
14
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
LNCS Springer-Verlag
-
D. Chaum, E. van Heijst, and B. Pfitzmann Cryptographically strong undeniable signatures, unconditionally secure for the signer Advances in Cryptology-Crypto 1991 LNCS vol. 576 1991 Springer-Verlag 470 484
-
(1991)
Advances in Cryptology-Crypto 1991
, vol.576 VOL.
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
15
-
-
85001025766
-
Wallet databases with observers
-
LNCS Springer-Verlag
-
D. Chaum, and T. Pedersen Wallet databases with observers Advances in Cryptology-Crypto 1992 LNCS vol. 740 1993 Springer-Verlag 89 105
-
(1993)
Advances in Cryptology-Crypto 1992
, vol.740 VOL.
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
16
-
-
84948967686
-
Confirmer signature schemes secure against adaptive adversaries
-
LNCS Springer-Verlag
-
J. Camenisch, and M. Michels Confirmer signature schemes secure against adaptive adversaries Advances in Cryptology-Eurocrypt 2000 LNCS vol. 1870 2000 Springer-Verlag 243 258
-
(2000)
Advances in Cryptology-Eurocrypt 2000
, vol.1870 VOL.
, pp. 243-258
-
-
Camenisch, J.1
Michels, M.2
-
17
-
-
35048828982
-
Chameleon hashing without key exposure
-
LNCS Springer-Verlag
-
X. Chen, F. Zhang, and K. Kim Chameleon hashing without key exposure ISC 2004 LNCS vol. 3225 2004 Springer-Verlag 87 98
-
(2004)
ISC 2004
, vol.3225 VOL.
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
18
-
-
79959994419
-
Discrete logarithm based chameleon hashing and signatures without key exposure
-
X. Chen, F. Zhang, H. Tian, B. Wei, and K. Kim Discrete logarithm based chameleon hashing and signatures without key exposure Comput. Electr. Eng. 37 4 2011 614 623
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.4
, pp. 614-623
-
-
Chen, X.1
Zhang, F.2
Tian, H.3
Wei, B.4
Kim, K.5
-
19
-
-
78649844945
-
Identity-based chameleon hash scheme without key exposure
-
LNCS Springer-Verlag
-
X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, and K. Kim Identity-based chameleon hash scheme without key exposure ACISP 2010 LNCS vol. 6168 2010 Springer-Verlag 200 215
-
(2010)
ACISP 2010
, vol.6168 VOL.
, pp. 200-215
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Tian, H.4
Li, J.5
Kim, K.6
-
20
-
-
79960816826
-
Comments and improvements on key-exposure free chameleon hashing based on factoring
-
LNCS Springer-Verlag
-
X. Chen, F. Zhang, H. Tian, and Y. Ding Comments and improvements on key-exposure free chameleon hashing based on factoring Inscrypt 2010 LNCS vol. 6584 2011 Springer-Verlag 415 426
-
(2011)
Inscrypt 2010
, vol.6584 VOL.
, pp. 415-426
-
-
Chen, X.1
Zhang, F.2
Tian, H.3
Ding, Y.4
-
21
-
-
33847010568
-
Chameleon hashes without key exposure based on factoring
-
W. Gao, X. Wang, and D. Xie Chameleon hashes without key exposure based on factoring J. Comput. Sci. Technol. 22 1 2007 109 113
-
(2007)
J. Comput. Sci. Technol.
, vol.22
, Issue.1
, pp. 109-113
-
-
Gao, W.1
Wang, X.2
Xie, D.3
-
22
-
-
55749094141
-
Chameleon hash without key exposure based on Schnorr signature
-
W. Gao, F. Li, and X. Wang Chameleon hash without key exposure based on Schnorr signature Comput. Stand. Interf. 31 2009 282 285
-
(2009)
Comput. Stand. Interf.
, vol.31
, pp. 282-285
-
-
Gao, W.1
Li, F.2
Wang, X.3
-
23
-
-
84944870499
-
RSA-based undeniable signatures for general moduli
-
LNCS Springer-Verlag
-
S. Galbraith, W. Mao, and K.G. Paterson RSA-based undeniable signatures for general moduli CT-RSA 2002 LNCS vol. 2271 2002 Springer-Verlag 200 217
-
(2002)
CT-RSA 2002
, vol.2271 VOL.
, pp. 200-217
-
-
Galbraith, S.1
Mao, W.2
Paterson, K.G.3
-
24
-
-
35248865251
-
Invisibility and anonymity of undeniable and confirmer signatures
-
LNCS Springer-Verlag
-
S. Galbraith, and W. Mao Invisibility and anonymity of undeniable and confirmer signatures CT-RSA 2003 LNCS vol. 2612 2003 Springer-Verlag 80 97
-
(2003)
CT-RSA 2003
, vol.2612 VOL.
, pp. 80-97
-
-
Galbraith, S.1
Mao, W.2
-
26
-
-
26444461753
-
Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-In-The-Middle attacks
-
LNCS Springer-Verlag
-
R. Gennaro Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks Advances in Cryptology-Crypto 2004 LNCS vol. 3152 2004 Springer-Verlag 220 236
-
(2004)
Advances in Cryptology-Crypto 2004
, vol.3152 VOL.
, pp. 220-236
-
-
Gennaro, R.1
-
27
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
LNCS Springer-Verlag
-
F. Hess Efficient identity based signature schemes based on pairings SAC 2002 LNCS vol. 2595 2002 Springer-Verlag 310 324
-
(2002)
SAC 2002
, vol.2595 VOL.
, pp. 310-324
-
-
Hess, F.1
-
29
-
-
84958550160
-
The Weil and Tate pairings as building blocks for public key cryptosystems
-
LNCS Springer-Verlag
-
A. Joux The Weil and Tate pairings as building blocks for public key cryptosystems ANTS 2002 LNCS vol. 2369 2002 Springer-Verlag 20 32
-
(2002)
ANTS 2002
, vol.2369 VOL.
, pp. 20-32
-
-
Joux, A.1
-
30
-
-
24944515454
-
3-Move undeniable signature scheme
-
LNCS Springer-Verlag
-
K. Kurosawa, and S. Heng 3-Move undeniable signature scheme Advances in Cryptology-Eurocrypt 2005 LNCS vol. 3494 2005 Springer-Verlag 181 197
-
(2005)
Advances in Cryptology-Eurocrypt 2005
, vol.3494 VOL.
, pp. 181-197
-
-
Kurosawa, K.1
Heng, S.2
-
31
-
-
33750022061
-
Relations among security notions for undeniable signature schemes
-
LNCS Springer-Verlag
-
K. Kurosawa, and S. Heng Relations among security notions for undeniable signature schemes SCN 2006 LNCS vol. 4116 2006 Springer-Verlag 34 48
-
(2006)
SCN 2006
, vol.4116 VOL.
, pp. 34-48
-
-
Kurosawa, K.1
Heng, S.2
-
32
-
-
84959444946
-
Chameleon signatures
-
H. Krawczyk, T. Rabin, Chameleon signatures, in: Proc. of NDSS 2000, A Preliminary Version can be Found at Cryptology ePrint Archive: Report 1998/010, 2000, pp.143-154.
-
(2000)
Proc. of NDSS 2000, A Preliminary Version Can Be Found at Cryptology EPrint Archive: Report 1998/010
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
33
-
-
23944478290
-
ID-based undeniable signatures
-
LNCS Springer-Verlag
-
B. Libert, and J. Quisquater ID-based undeniable signatures CT-RSA 2004 LNCS vol. 2694 2004 Springer-Verlag 112 125
-
(2004)
CT-RSA 2004
, vol.2694 VOL.
, pp. 112-125
-
-
Libert, B.1
Quisquater, J.2
-
34
-
-
22144445920
-
The Weil pairing, and its efficient calculation
-
V. Miller The Weil pairing, and its efficient calculation J. Cryptol. 17 4 2004 235 261
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.1
-
35
-
-
35048904095
-
Generic homomorphic undeniable signatures
-
LNCS Springer-Verlag
-
J. Monnerat, and S. Vaudenay Generic homomorphic undeniable signatures Advances in Cryptology-Asiacrypt 2004 LNCS vol. 3329 2004 Springer-Verlag 354 371
-
(2004)
Advances in Cryptology-Asiacrypt 2004
, vol.3329 VOL.
, pp. 354-371
-
-
Monnerat, J.1
Vaudenay, S.2
-
36
-
-
24144448778
-
The security of the FDH variant of Chaum's undeniable signature scheme
-
LNCS Springer-Verlag
-
W. Ogata, K. Kurosawa, and S. Heng The security of the FDH variant of Chaum's undeniable signature scheme PKC 2005 LNCS vol. 3386 2005 Springer-Verlag 328 345
-
(2005)
PKC 2005
, vol.3386 VOL.
, pp. 328-345
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.3
-
37
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
LNCS Springer-Verlag
-
T. Okamoto, and D. Pointcheval The gap-problems: a new class of problems for the security of cryptographic schemes PKC 2001 LNCS vol. 1992 2001 Springer-Verlag 104 118
-
(2001)
PKC 2001
, vol.1992 VOL.
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
39
-
-
0000089246
-
Efficient signature generation for smart cards
-
C.P. Schnorr Efficient signature generation for smart cards J. Cryptol. 4 3 1991 239 252
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
41
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS Springer-Verlag
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology-Crypto 1984 LNCS vol. 196 1984 Springer-Verlag 47 53
-
(1984)
Advances in Cryptology-Crypto 1984
, vol.196 VOL.
, pp. 47-53
-
-
Shamir, A.1
|