-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys, " in Proc. 8th Int. Conf. Theory Appl. Cryptol. Inform. Security: Adv. Cryptol., 2002, vol. 2501, pp. 415-432.
-
(2002)
Proc. 8th Int. Conf. Theory Appl. Cryptol. Inform. Security: Adv. Cryptol.
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
85066568952
-
Two remarks on public-key cryptology
-
Sep. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security 1997.)
-
R. Anderson, "Two remarks on public-key cryptology, " Manuscript, Sep. 2000. (Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security, 1997.)
-
(2000)
Manuscript
-
-
Anderson, R.1
-
3
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme, " in Proc. 20th Annu. Int. Cryptol. Conf. Adv. Cryptol., 2000, vol. 1880, pp. 255-270.
-
(2000)
Proc. 20th Annu. Int. Cryptol. Conf. Adv. Cryptol.
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
33845272549
-
ID-based ring signature scheme secure in the standard model
-
M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong, "ID-based ring signature scheme secure in the standard model, " in Proc. 1st Int. Workshop Security Adv. Inform. Comput. Security, 2006, vol. 4266, pp. 1-16.
-
(2006)
Proc. 1st Int. Workshop Security Adv. Inform. Comput. Security
, vol.4266
, pp. 1-16
-
-
Au, M.H.1
Liu, J.K.2
Yuen, T.H.3
Wong, D.S.4
-
5
-
-
26444521603
-
Id-based ring signature and proxy ring signature schemes from bilinear pairings
-
abs/cs/0504097
-
A. K. Awasthi and S. Lal, "Id-based ring signature and proxy ring signature schemes from bilinear pairings, " CoRR, vol. abs/cs/0504097, 2005.
-
(2005)
CoRR
-
-
Awasthi, A.K.1
Lal, S.2
-
6
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements and a construction based on general assumptions
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements and a construction based on general assumptions, " in Proc. 22nd Int. Conf. Theory Appl. Cryptographic Techn., 2003, vol. 2656, pp. 614-629.
-
(2003)
Proc. 22nd Int. Conf. Theory Appl. Cryptographic Techn.
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
8
-
-
84897586246
-
Security and privacy-enhancing multicloud architectures
-
Jul.\Aug.
-
J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau, "Security and privacy-enhancing multicloud architectures, " IEEE Trans. Dependable Sec. Comput., vol. 10, no. 4, pp. 212-224, Jul.\Aug. 2013.
-
(2013)
IEEE Trans. Dependable Sec. Comput.
, vol.10
, Issue.4
, pp. 212-224
-
-
Bohli, J.-M.1
Gruschka, N.2
Jensen, M.3
Iacono, L.L.4
Marnau, N.5
-
9
-
-
0842304790
-
Efficient threshold signature, multisignature and blind signature schemes based on the gap Diffie-Hellman group signature scheme
-
A. Boldyreva, "Efficient threshold signature, multisignature and blind signature schemes based on the gap Diffie-Hellman group signature scheme, " in Proc. 6th Int. Workshop Theory Practice PublicKey Cryptography: Public Key Cryptography, 2003, vol. 567, pp. 31-46.
-
(2003)
Proc. 6th Int. Workshop Theory Practice PublicKey Cryptography: Public Key Cryptography
, vol.567
, pp. 31-46
-
-
Boldyreva, A.1
-
10
-
-
35048887476
-
Short group signatures
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures, " in Proc.Annu.Int. Cryptol. Conf. Adv. Cryptol., 2004, vol. 3152, pp. 41-55.
-
(2004)
Proc.Annu.Int. Cryptol. Conf. Adv. Cryptol.
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
11
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups, " in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., 2002, vol. 2442, pp. 465-480.
-
(2002)
Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol.
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
13
-
-
38149083391
-
Ring signatures of sublinear size without random oracles
-
N. Chandran, J. Groth, and A. Sahai, "Ring signatures of sublinear size without random oracles, " in Proc. 34th Int. Colloq. Automata, Lang. Programming, 2007, vol. 4596, pp. 423-434.
-
(2007)
Proc. 34th Int. Colloq. Automata, Lang. Programming
, vol.4596
, pp. 423-434
-
-
Chandran, N.1
Groth, J.2
Sahai, A.3
-
14
-
-
84870930793
-
Social cloud computing:Avision for socially motivated resource sharing
-
FourthQuarter
-
K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, "Social cloud computing:Avision for socially motivated resource sharing, " IEEE Trans.Serv.Comput., vol.5, no.4, pp.551-563, FourthQuarter2012.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.4
, pp. 551-563
-
-
Chard, K.1
Bubendorfer, K.2
Caton, S.3
Rana, O.F.4
-
16
-
-
35048878391
-
Concurrent signatures
-
L. Chen, C. Kudla, and K. G. Paterson, "Concurrent signatures, " in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2004, vol. 3027, pp. 287-305.
-
(2004)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, vol.3027
, pp. 287-305
-
-
Chen, L.1
Kudla, C.2
Paterson, K.G.3
-
17
-
-
67049096358
-
Highly efficient ID-based ring signature from pairings
-
H.-Y. Chien, "Highly efficient ID-based ring signature from pairings, " in Proc. IEEE Asia-Pacific Serv. Comput. Conf., 2008, pp. 829-834.
-
(2008)
Proc. IEEE Asia-Pacific Serv. Comput. Conf.
, pp. 829-834
-
-
Chien, H.-Y.1
-
18
-
-
33646033139
-
Identity based ring signature: Why, how and what next
-
S. S. Chow, R. W. Lui, L. C. Hui, and S. Yiu, "Identity based ring signature: Why, how and what next, " in Proc. 2nd Eur. Public Key Infrastructure Workshop, 2005, vol. 3545, pp. 144-161.
-
(2005)
Proc. 2nd Eur. Public Key Infrastructure Workshop
, vol.3545
, pp. 144-161
-
-
Chow, S.S.1
Lui, R.W.2
Hui, L.C.3
Yiu, S.4
-
19
-
-
33845246483
-
Ring signatures without random oracles
-
S. S. M. Chow, V.K.-W. Wei, J. K. Liu, and T. H. Yuen, "Ring signatures without random oracles, " in Proc. ACM Symp. Inform., Comput., Commun. Security, 2006, pp. 297-302.
-
(2006)
Proc. ACM Symp. Inform., Comput., Commun. Security
, pp. 297-302
-
-
Chow, S.S.M.1
Wei, V.K.-W.2
Liu, J.K.3
Yuen, T.H.4
-
20
-
-
26444540788
-
Efficient identity based ring signature
-
S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, "Efficient identity based ring signature, " in Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security, 2005, vol. 3531, pp. 499-512.
-
(2005)
Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
21
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
R. Cramer, I. Damgard, and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols, " in Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1994, vol. 839, pp. 174-187.
-
(1994)
Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol.
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
23
-
-
35048854233
-
Anonymous identification in Ad Hoc groups
-
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup, "Anonymous identification in Ad Hoc groups, " in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2004, vol. 3027, pp. 609-626.
-
(2004)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
24
-
-
67650224819
-
Practical short signature batch verification
-
[online]. Available:
-
A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen. (2009). Practical short signature batch verification, " in Proc. Cryptographers' Track RSA Conf. Topics Cryptol., vol. 5473, pp. 309-324 [online]. Available: http://eprint.iacr.org/2008/015
-
(2009)
Proc. Cryptographers' Track RSA Conf. Topics Cryptol.
, vol.5473
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Hohenberger, S.3
Pedersen M.Ø4
-
25
-
-
63149178641
-
Efficient ID-based threshold ring signature scheme
-
J. Han, Q. Xu, and G. Chen, "Efficient ID-based threshold ring signature scheme, " in Proc. IEEE/IFIP Int. Conf. Embedded Ubiquitous Comput., 2008, pp. 437-442.
-
(2008)
Proc. IEEE/IFIP Int. Conf. Embedded Ubiquitous Comput.
, pp. 437-442
-
-
Han, J.1
Xu, Q.2
Chen, G.3
-
26
-
-
36048992805
-
Identity-based ring signatures from RSA
-
J. Herranz, "Identity-based ring signatures from RSA, " Theor. Comput. Sci., vol. 389, no. 1-2, pp. 100-117, 2007.
-
(2007)
Theor. Comput. Sci.
, vol.389
, Issue.1-2
, pp. 100-117
-
-
Herranz, J.1
-
27
-
-
0346265013
-
Forking lemmas for ring signature schemes
-
J. Herranz and G. S-aez, "Forking lemmas for ring signature schemes, " in Proc. 4th Int. Conf. Cryptol. India, 2003, vol. 2904, pp. 266-279.
-
(2003)
Proc. 4th Int. Conf. Cryptol. India
, vol.2904
, pp. 266-279
-
-
Herranz, J.1
Saez, G.2
-
28
-
-
54249131660
-
Step-out ring signatures
-
M. Klonowski, L. Krzywiecki, M. Kutylowski, and A. Lauks, "Step-out ring signatures, " in Proc. 33rd Int. Symp. Math. Found. Comput. Sci., 2008, vol. 5162, pp. 431-442.
-
(2008)
Proc. 33rd Int. Symp. Math. Found. Comput. Sci.
, vol.5162
, pp. 431-442
-
-
Klonowski, M.1
Krzywiecki, L.2
Kutylowski, M.3
Lauks, A.4
-
29
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
30
-
-
36549022482
-
Revocable ring signature
-
D. Y. W. Liu, J. K. Liu, Y. Mu, W. Susilo, and D. S. Wong, "Revocable ring signature, " J. Comput. Sci. Tech., vol. 22, no. 6, pp. 785-794, 2007.
-
(2007)
J. Comput. Sci. Tech.
, vol.22
, Issue.6
, pp. 785-794
-
-
Liu, D.Y.W.1
Liu, J.K.2
Mu, Y.3
Susilo, W.4
Wong, D.S.5
-
31
-
-
76549130777
-
Online/offline ring signature scheme
-
J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Online/offline ring signature scheme, " in Proc. 11th Int. Conf. Inform. Commun. Security, 2009, vol. 5927, pp. 80-90.
-
(2009)
Proc. 11th Int. Conf. Inform. Commun. Security
, vol.5927
, pp. 80-90
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
Zhou, J.4
-
32
-
-
33845249721
-
Ring signature with designated linkability
-
J. K. Liu, W. Susilo, and D. S. Wong, "Ring signature with designated linkability, " in Proc. 1st Int. Conf. Security, 2006, vol. 4266, pp. 104-119.
-
(2006)
Proc. 1st Int. Conf. Security
, vol.4266
, pp. 104-119
-
-
Liu, J.K.1
Susilo, W.2
Wong, D.S.3
-
33
-
-
35048889048
-
A separable threshold ring signature scheme
-
J. K. Liu, V. K. Wei, and D. S. Wong, "A separable threshold ring signature scheme, " in Proc. 6th Int. Conf. Inform. Security Cryptol., 2003, vol. 2971, pp. 12-26.
-
(2003)
Proc. 6th Int. Conf. Inform. Security Cryptol.
, vol.2971
, pp. 12-26
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
35
-
-
80355148452
-
Solutions to key exposure problem in ring signature
-
J. K. Liu and D. S. Wong, "Solutions to key exposure problem in ring signature, " I. J. Netw. Secur., vol. 6, no. 2, pp. 170-180, 2008.
-
(2008)
I. J. Netw. Secur.
, vol.6
, Issue.2
, pp. 170-180
-
-
Liu, J.K.1
Wong, D.S.2
-
36
-
-
81055144575
-
Forward secure ring signature without random oracles
-
J. K. Liu, T. H. Yuen, and J. Zhou, "Forward secure ring signature without random oracles, " in Proc. 13th Int. Conf. Inform. Commun. Security, 2011, vol. 7043, pp. 1-14.
-
(2011)
Proc. 13th Int. Conf. Inform. Commun. Security
, vol.7043
, pp. 1-14
-
-
Liu, J.K.1
Yuen, T.H.2
Zhou, J.3
-
37
-
-
84877786210
-
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
-
Jun.
-
X. Liu, Y. Zhang, B. Wang, and J. Yan, "Mona: Secure multi-owner data sharing for dynamic groups in the cloud, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182-1191, Jun. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
Yan, J.4
-
38
-
-
79959571025
-
A new efficient threshold ring signature scheme based on coding theory
-
Jul.
-
C. A. Melchor, P.-L. Cayrel, P. Gaborit, and F. Laguillaumie, "A new efficient threshold ring signature scheme based on coding theory, " IEEE Trans. Inform. Theory, vol. 57, no. 7, pp. 4833-4842, Jul. 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.7
, pp. 4833-4842
-
-
Melchor, C.A.1
Cayrel, P.-L.2
Gaborit, P.3
Laguillaumie, F.4
-
41
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
L. Nguyen, "Accumulators from bilinear pairings and applications, " in Proc. Int. Conf. Topics Cryptol., 2005, vol. 3376, pp. 275-292.
-
(2005)
Proc. Int. Conf. Topics Cryptol.
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
42
-
-
84946833891
-
How to leak a secret
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret, " in Proc. 7th Int. Conf. Theory Appl. Cryptol. Inform. Security: Adv. Cryptol., 2001, vol. 2248, pp. 552-565.
-
(2001)
Proc. 7th Int. Conf. Theory Appl. Cryptol. Inform. Security: Adv. Cryptol.
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
45
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes, " in Proc. CRYPTO 84 Adv. Cryptol., 1984, vol. 196, pp. 47-53.
-
(1984)
Proc. CRYPTO 84 Adv. Cryptol.
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
46
-
-
84861176850
-
Ensuring distributed accountability for data sharing in the cloud
-
Jul./Aug.
-
S. Sundareswaran, A. C. Squicciarini, and D. Lin, "Ensuring distributed accountability for data sharing in the cloud, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 4, pp. 556-568, Jul./Aug. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.4
, pp. 556-568
-
-
Sundareswaran, S.1
Squicciarini, A.C.2
Lin, D.3
-
47
-
-
26444587096
-
Perfect concurrent signature schemes
-
Oct.
-
W. Susilo, Y. Mu, and F. Zhang, "Perfect concurrent signature schemes, " in Proc. 6th Int. Conf. Inform. Commun. Security, Oct. 2004, vol. 3269, pp. 14-26.
-
(2004)
Proc. 6th Int. Conf. Inform. Commun. Security
, vol.3269
, pp. 14-26
-
-
Susilo, W.1
Mu, Y.2
Zhang, F.3
-
48
-
-
78449233611
-
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
-
P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo, and D. S. Wong, "A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract), " in Proc. 4th Int. Conf. Provable Security, 2010, vol. 6402, pp. 166-183.
-
(2010)
Proc. 4th Int. Conf. Provable Security
, vol.6402
, pp. 166-183
-
-
Tsang, P.P.1
Au, M.H.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
-
49
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage, " IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
50
-
-
0142218983
-
On the RS-Code construction of ring signature schemes and a threshold setting of RST
-
D. S. Wong, K. Fung, J. K. Liu, and V. K. Wei, "On the RS-Code construction of ring signature schemes and a threshold setting of RST, " in Proc. 5th Int. Conf. Inform. Commun. Security, 2003, vol. 2836, pp. 34-46.
-
(2003)
Proc. 5th Int. Conf. Inform. Commun. Security
, vol.2836
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
51
-
-
84877883464
-
Attribute-based access to scalable media in cloud-assisted content sharing networks
-
Jun.
-
Y. Wu, Z.Wei, and R. H. Deng, "Attribute-based access to scalable media in cloud-assisted content sharing networks, " IEEE Trans. Multimedia, vol. 15, no. 4, pp. 778-788, Jun. 2013.
-
(2013)
IEEE Trans. Multimedia
, vol.15
, Issue.4
, pp. 778-788
-
-
Wu, Y.1
Wei, Z.2
Deng, R.H.3
-
52
-
-
84897009676
-
An anonymous sealed-bid electronic auction based on ring signature
-
H. Xiong, Z. Qin, and F. Li, "An anonymous sealed-bid electronic auction based on ring signature, " I. J. Netw. Secur., vol. 8, no. 3, pp. 235-242, 2009.
-
(2009)
I. J. Netw. Secur.
, vol.8
, Issue.3
, pp. 235-242
-
-
Xiong, H.1
Qin, Z.2
Li, F.3
-
53
-
-
84879285531
-
Security challenges in vehicular cloud computing
-
Mar.
-
G. Yan, D. Wen, S. Olariu, and M. Weigle, "Security challenges in vehicular cloud computing, " IEEE Trans. Intell. Transp. Syst., vol. 14, no. 1, pp. 284-294, Mar. 2013.
-
(2013)
IEEE Trans. Intell. Transp. Syst.
, vol.14
, Issue.1
, pp. 284-294
-
-
Yan, G.1
Wen, D.2
Olariu, S.3
Weigle, M.4
-
54
-
-
78449305489
-
Forwardsecure identity-based signature: Security notions and construction
-
J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, "Forwardsecure identity-based signature: Security notions and construction, " Inform. Sci., vol. 181, no. 3, pp. 648-660, 2011.
-
(2011)
Inform. Sci.
, vol.181
, Issue.3
, pp. 648-660
-
-
Yu, J.1
Hao, R.2
Kong, F.3
Cheng, X.4
Fan, J.5
Chen, Y.6
-
55
-
-
84862074358
-
Noninteractive forward-secure threshold signature without random oracles
-
J. Yu, F. Kong, H. Zhao, X. Cheng, R. Hao, and X.-F. Guo, "Noninteractive forward-secure threshold signature without random oracles, " J. Inform. Sci. Eng., vol. 28, no. 3, pp. 571-586, 2012.
-
(2012)
J. Inform. Sci. Eng.
, vol.28
, Issue.3
, pp. 571-586
-
-
Yu, J.1
Kong, F.2
Zhao, H.3
Cheng, X.4
Hao, R.5
Guo, X.-F.6
-
56
-
-
84868332239
-
Forward secure attribute-based signatures
-
T. H. Yuen, J. K. Liu, X. Huang, M. H. Au, W. Susilo, and J. Zhou, "Forward secure attribute-based signatures, " in Proc. 14th Int. Conf. Inform. Commun. Security, 2012, vol. 7618, pp. 167-177.
-
(2012)
Proc. 14th Int. Conf. Inform. Commun. Security
, vol.7618
, pp. 167-177
-
-
Yuen, T.H.1
Liu, J.K.2
Huang, X.3
Au, M.H.4
Susilo, W.5
Zhou, J.6
-
58
-
-
38049176603
-
An efficient identity-based ring signature scheme and its extension
-
J. Zhang, "An efficient identity-based ring signature scheme and its extension, " in Proc. Int. Conf. Comput. Sci. Appl., 2007, vol. 4706, pp. 63-74.
-
(2007)
Proc. Int. Conf. Comput. Sci. Appl.
, vol.4706
, pp. 63-74
-
-
Zhang, J.1
|