-
2
-
-
84872612220
-
Doubletrapdoor anonymous tags for traceable signatures
-
M. Abe, S. S. M. Chow, K. Haralambiev, and M. Ohkubo, "Doubletrapdoor anonymous tags for traceable signatures," Int. J. Inf. Secur., vol. 12, no. 1, pp. 19-31, 2013.
-
(2013)
Int. J. Inf. Secur.
, vol.12
, Issue.1
, pp. 19-31
-
-
Abe, M.1
Chow, S.S.M.2
Haralambiev, K.3
Ohkubo, M.4
-
3
-
-
84883290441
-
Accumulators and U-prove revocation
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
T. Acar, S. S. M. Chow, and L. Nguyen, "Accumulators and U-prove revocation," in Financial Cryptography and Data Security. (Lecture Notes in Computer Science), vol. 7859. Berlin, Germany: Springer-Verlag, 2013, pp. 189-196.
-
(2013)
Financial Cryptography and Data Security.
, vol.7859
, pp. 189-196
-
-
Acar, T.1
Chow, S.S.M.2
Nguyen, L.3
-
4
-
-
85168123147
-
BLACR: TTP-free blacklistable anonymous credentials with reputation
-
M. H. Au, A. Kapadia, and W. Susilo, "BLACR: TTP-free blacklistable anonymous credentials with reputation," in Proc. 19th NDSS, 2012, pp. 1-17.
-
(2012)
Proc. 19th NDSS
, pp. 1-17
-
-
Au, M.H.1
Kapadia, A.2
Susilo, W.3
-
5
-
-
84871816306
-
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
-
Jan.
-
M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, "Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction," Theoretical Comput. Sci., vol. 469, pp. 1-14, Jan. 2013.
-
(2013)
Theoretical Comput. Sci.
, vol.469
, pp. 1-14
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
6
-
-
84875252646
-
Constant-size dynamic k-times anonymous authentication
-
Jun.
-
M. H. Au, W. Susilo, Y. Mu, and S. S. M. Chow, "Constant-size dynamic k-times anonymous authentication," IEEE Syst. J., vol. 7, no. 2, pp. 249-261, Jun. 2013.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.2
, pp. 249-261
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
Chow, S.S.M.4
-
7
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2656. Berlin, Germany: Springer-Verlag, 2003, pp. 614-629.
-
(2003)
Advances in Cryptology
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
8
-
-
35048848152
-
Short signatures without random oracles
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
D. Boneh and X. Boyen, "Short signatures without random oracles," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. Berlin, Germany: Springer-Verlag, 2004, pp. 56-73.
-
(2004)
Advances in Cryptology
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
14844309671
-
Group signatures with verifier-local revocation
-
D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. 11th ACM Conf. CCS, 2004, pp. 168-177.
-
(2004)
Proc. 11th ACM Conf. CCS
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
10
-
-
84863345554
-
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
May/Jun.
-
E. Brickell and J. Li, "Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities," IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 345-360, May/Jun. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.3
, pp. 345-360
-
-
Brickell, E.1
Li, J.2
-
11
-
-
84867653103
-
VLR group signatures-How to achieve both backward unlinkability and efficient revocation checks
-
J. Bringer and A. Patey, "VLR group signatures-How to achieve both backward unlinkability and efficient revocation checks," in Proc. SECRYPT, 2012, pp. 215-220.
-
(2012)
Proc. SECRYPT
, pp. 215-220
-
-
Bringer, J.1
Patey, A.2
-
12
-
-
85024290278
-
Group signatures
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
D. Chaum and E. van Heyst, "Group Signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 547. Berlin, Germany: Springer-Verlag, 1991, pp. 257-265.
-
(1991)
Advances in Cryptology
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
13
-
-
78649247782
-
VLR group signatures with indisputable exculpability and efficient revocation
-
Aug.
-
L. Chen and J. Li, "VLR group signatures with indisputable exculpability and efficient revocation," in Proc. IEEE 2nd Int. Conf. SocialCom, Aug. 2010, pp. 727-734.
-
(2010)
Proc. IEEE 2nd Int. Conf. SocialCom
, pp. 727-734
-
-
Chen, L.1
Li, J.2
-
14
-
-
79951969637
-
Threshold anonymous announcement in VANETs
-
Mar.
-
L. Chen, S.-L. Ng, and G. Wang, "Threshold anonymous announcement in VANETs," IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605-615, Mar. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.3
, pp. 605-615
-
-
Chen, L.1
Ng, S.-L.2
Wang, G.3
-
15
-
-
70549093018
-
Real traceable signatures
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
S. S. M. Chow, "Real traceable signatures," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 5867. Berlin, Germany: Springer-Verlag, 2009, pp. 92-107.
-
(2009)
Selected Areas in Cryptography
, vol.5867
, pp. 92-107
-
-
Chow, S.S.M.1
-
16
-
-
84887308796
-
Escrowed linkability of ring signatures and its applications
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
S. S. M. Chow, W. Susilo, and T. H. Yuen, "Escrowed linkability of ring signatures and its applications," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 175-192.
-
(2006)
Progress in Cryptology
, vol.4341
, pp. 175-192
-
-
Chow, S.S.M.1
Susilo, W.2
Yuen, T.H.3
-
17
-
-
84871963444
-
Verifier-local revocation group signatures with time-bound keys
-
C.-K. Chu, J. K. Liu, X. Huang, and J. Zhou, "Verifier-local revocation group signatures with time-bound keys," in Proc. 7th ACM Symp. Inf., Comput. Commun. Secur., 2012, pp. 26-27.
-
(2012)
Proc. 7th ACM Symp. Inf., Comput. Commun. Secur.
, pp. 26-27
-
-
Chu, C.-K.1
Liu, J.K.2
Huang, X.3
Zhou, J.4
-
18
-
-
53249117524
-
Pairings for cryptographers
-
S. D. Galbraith, K. G. Paterson, and N. P. Smart, "Pairings for cryptographers," Discrete Appl. Math., vol. 156, no. 16, pp. 3113-3121, 2008.
-
(2008)
Discrete Appl. Math.
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
19
-
-
37549017388
-
Trust-based fast authentication for multiowner wireless networks
-
Feb.
-
J. Hassan, H. Sirisena, and B. Landfeldt, "Trust-based fast authentication for multiowner wireless networks," IEEE Trans. Mobile Comput., vol. 7, no. 2, pp. 247-261, Feb. 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.2
, pp. 247-261
-
-
Hassan, J.1
Sirisena, H.2
Landfeldt, B.3
-
20
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
Feb.
-
D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
21
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Sep.
-
Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
22
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
Jan.
-
W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, Jan. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.-B.1
Yeh, C.-K.2
-
23
-
-
71549128039
-
Group signatures with verifier-local revocation and backward unlinkability in the standard model
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
B. Libert and D. Vergnaud, "Group signatures with verifier-local revocation and backward unlinkability in the standard model," in Cryptology and Network Security (Lecture Notes in Computer Science), vol. 5888. Berlin, Germany: Springer-Verlag, 2009, pp. 498-517.
-
(2009)
Cryptology and Network Security
, vol.5888
, pp. 498-517
-
-
Libert, B.1
Vergnaud, D.2
-
24
-
-
80052825573
-
Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure
-
Sep.
-
H.-J. Lim, M. Kim, J.-H. Lee, D.-H. Seo, and T. M. Chung, "Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure," IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3408-3423, Sep. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.7
, pp. 3408-3423
-
-
Lim, H.-J.1
Kim, M.2
Lee, J.-H.3
Seo, D.-H.4
Chung, T.M.5
-
25
-
-
26444581774
-
An efficient solution to the Millionaires' problem based on homomorphic encryption
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
H.-Y. Lin and W.-G. Tzeng, "An efficient solution to the Millionaires' problem based on homomorphic encryption," in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 3531. Berlin, Germany: Springer-Verlag, 2005, pp. 456-466.
-
(2005)
Applied Cryptography and Network Security
, vol.3531
, pp. 456-466
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
26
-
-
36549022482
-
Revocable ring signature
-
D. Y. W. Liu, J. K. Liu, Y. Mu, W. Susilo, and D. S. Wong, "Revocable ring signature," J. Comput. Sci. Technol., vol. 22, no. 6, pp. 785-794, 2007.
-
(2007)
J. Comput. Sci. Technol.
, vol.22
, Issue.6
, pp. 785-794
-
-
Liu, D.Y.W.1
Liu, J.K.2
Mu, Y.3
Susilo, W.4
Wong, D.S.5
-
27
-
-
33646771737
-
Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
T. Nakanishi and N. Funabiki, "Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3788. Berlin, Germany: Springer-Verlag, 2005, pp. 533-548.
-
(2005)
Advances in Cryptology
, vol.3788
, pp. 533-548
-
-
Nakanishi, T.1
Funabiki, N.2
-
28
-
-
33845276220
-
A short verifier-local revocation group signature scheme with backward unlinkability
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
T. Nakanishi and N. Funabiki, "A short verifier-local revocation group signature scheme with backward unlinkability," in Advances in Information and Computer Security (Lecture Notes in Computer Science), vol. 4266. Berlin, Germany: Springer-Verlag, 2006, pp. 17-32.
-
(2006)
Advances in Information and Computer Security
, vol.4266
, pp. 17-32
-
-
Nakanishi, T.1
Funabiki, N.2
-
29
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
L. Nguyen, "Accumulators from bilinear pairings and applications," in Topics in Cryptology (Lecture Notes in Computer Science), vol. 3376. Berlin, Germany: Springer-Verlag, 2005, pp. 275-292.
-
(2005)
Topics in Cryptology
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
30
-
-
11944251256
-
Anonymous wireless authentication on a portable cellular mobile system
-
Oct.
-
S.-J. Wang, "Anonymous wireless authentication on a portable cellular mobile system," IEEE Trans. Comput., vol. 53, no. 10, pp. 1317-1329, Oct. 2004.
-
(2004)
IEEE Trans. Comput.
, vol.53
, Issue.10
, pp. 1317-1329
-
-
Wang, S.-J.1
-
31
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
Jan.
-
G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-174, Jan. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.S.3
Deng, X.4
-
32
-
-
84865583485
-
PE(AR)2: Privacy-enhanced anonymous authentication with reputation and revocation
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
K. Y. Yu, T. H. Yuen, S. S. M. Chow, S. M. Yiu, and L. C. K. Hui, "PE(AR)2: Privacy-enhanced anonymous authentication with reputation and revocation," in Computer Security (Lecture Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012, pp. 679-696.
-
(2012)
Computer Security
, vol.7459
, pp. 679-696
-
-
Yu, K.Y.1
Yuen, T.H.2
Chow, S.S.M.3
Yiu, S.M.4
Hui, L.C.K.5
-
33
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Mar.
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
|