-
1
-
-
84946833891
-
How to leak a secret
-
LNCS 2248
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," Advances in Cryptology- ASIACRYPT, LNCS 2248, 2001, pp. 552-565
-
(2001)
Advances in Cryptology- ASIACRYPT
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
0242613415
-
ID-based blind signature and ring signature form pairings
-
LNCS 2501
-
F. Zhang and K. Kim, "ID-based blind signature and ring signature form pairings," Advance in Cryptology-Asiacrypt, LNCS 2501, 2002, pp. 629-637
-
(2002)
Advance in Cryptology-Asiacrypt
, pp. 629-637
-
-
Zhang, F.1
Kim, K.2
-
3
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Advance in Croptology- Crypto, 1985, pp. 47-53
-
(1985)
Advance in Croptology- Crypto
, pp. 47-53
-
-
Shamir, A.1
-
4
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups
-
LNCS 3108
-
J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups," Information Security and Privacy, LNCS 3108, 2004, pp. 325-335
-
(2004)
Information Security and Privacy
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
5
-
-
84937420077
-
Threshold ring signatures and applications to Fdad-hoc groups
-
LNCS 2442
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to Fdad-hoc groups," Advances in Cryptology-Crypto, LNCS 2442, 2002, pp. 465-480
-
(2002)
Advances in Cryptology-Crypto
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
7
-
-
72849116879
-
Cryptanalysis and improvement of a ring signature based on ElGamal signature
-
H. Wang, S. Han, C. Deng, and F. Zhang, "Cryptanalysis and improvement of a ring signature based on ElGamal signature," in Proceedings of WRI World Congress on Software Engineering, Vol. 3, 2009, pp. 397-401
-
(2009)
Proceedings of WRI World Congress on Software Engineering
, vol.3
, pp. 397-401
-
-
Wang, H.1
Han, S.2
Deng, C.3
Zhang, F.4
-
8
-
-
70249102704
-
Strong designated verifier ring signature scheme
-
Springer-Verlag, NY
-
J. S. Lee and J. H. Chang, "Strong designated verifier ring signature scheme," Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Springer-Verlag, NY, 2007, pp. 543-547
-
(2007)
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
, pp. 543-547
-
-
Lee, J.S.1
Chang, J.H.2
-
11
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) + cost (signature) + cost (encryption)
-
LNCS 1294
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost (encryption)," Advances in Crypto'97, LNCS 1294, 1997, pp. 165-179 (Pubitemid 127112551)
-
(1997)
Advances in Cryptology - CRYPTO '97
, pp. 165-179
-
-
Zheng, Y.1
-
12
-
-
33744502401
-
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
-
DOI 10.1109/AINA.2005.205, 1423769, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world," in Proceedings of Advanced Information Networking and Applications, 2005, pp. 649-654 (Pubitemid 43804104)
-
(2005)
Proceedings of Advanced Information Networking and Applications
, vol.2
, pp. 649-654
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
13
-
-
73149094073
-
A strong designated verifier ring signcryption scheme
-
S. Han, H. Wang, and X. Wang, "A strong designated verifier ring signcryption scheme," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, pp. 4450-4453
-
(2009)
Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 4450-4453
-
-
Han, S.1
Wang, H.2
Wang, X.3
-
14
-
-
70350754081
-
On the security of identity based ring signcryption scheme
-
LNCS 5735
-
S. Sharmila D. Selvi, S. S. Vivek, and C. P. Rangan, "On the security of identity based ring signcryption scheme," Information Security, LNCS 5735, 2009, pp. 310- 325
-
(2009)
Information Security
, pp. 310-325
-
-
Sharmila, S.1
Selvi, D.2
Vivek, S.S.3
Rangan, C.P.4
-
15
-
-
55749111906
-
An efficient identity-based anonymous signcryption scheme
-
Y. Yu, F. Li, C. Xu, and Y. Sun, "An efficient identity-based anonymous signcryption scheme," Wuhan University Journal of Natural Sciences, Vol. 13, 2008, pp. 670-674
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, pp. 670-674
-
-
Yu, Y.1
Li, F.2
Xu, C.3
Sun, Y.4
-
16
-
-
68849116766
-
An efficient and provable secure identity based ring signcryption scheme
-
Z.-C. Zhu, Y.-Z. Zhang, and F. Wang, "An efficient and provable secure identity based ring signcryption scheme," Computer Standards and Interfaces, Vol. 31, 2009, pp. 1092-1097
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 1092-1097
-
-
Zhu, Z.-C.1
Zhang, Y.-Z.2
Wang, F.3
-
17
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
M. Zhang, B. Yang, S. Zhu, and W. Zhang, "Efficient secret authenticatable anonymous signcryption scheme with identity privacy," in Proceedings of IEEE International Workshops on Intelligence and Security Informatics, 2008, pp. 126-137
-
(2008)
Proceedings of IEEE International Workshops on Intelligence and Security Informatics
, pp. 126-137
-
-
Zhang, M.1
Yang, B.2
Zhu, S.3
Zhang, W.4
-
18
-
-
58149171539
-
An efficient Id-based ring signcryption scheme
-
F. Li, H. Xiong, and Y. Yu, "An efficient Id-based ring signcryption scheme," Communications, Circuits and Systems, 2008, pp. 483-487
-
(2008)
Communications, Circuits and Systems
, pp. 483-487
-
-
Li, F.1
Xiong, H.2
Yu, Y.3
-
19
-
-
57949099353
-
Analysis and improvement of authenticatable ring signcryption scheme
-
F. Li, M. Shirase, and T. Takagi, "Analysis and improvement of authenticatable ring signcryption scheme," Journal of Shanghai Jiaotong University, Vol. 13, 2008, pp. 679-683
-
(2008)
Journal of Shanghai Jiaotong University
, vol.13
, pp. 679-683
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
|