-
1
-
-
33646817427
-
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)
-
B.K. Roy, Lecture Notes in Computer Science Springer
-
J. Baek, R. Safavi-Naini, and W. Susilo Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature) B.K. Roy, ASIACRYPT Lecture Notes in Computer Science vol. 3788 2005 Springer 644 661
-
(2005)
ASIACRYPT
, vol.3788
, pp. 644-661
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
2
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme J. Cryptol. 16 3 2003 185 215
-
(2003)
J. Cryptol.
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
84958775356
-
Transitive signatures based on factoring and RSA
-
Y. Zheng, Lecture Notes in Computer Science Springer
-
M. Bellare, and G. Neven Transitive signatures based on factoring and RSA Y. Zheng, ASIACRYPT Lecture Notes in Computer Science vol. 2501 2002 Springer 397 414
-
(2002)
ASIACRYPT
, vol.2501
, pp. 397-414
-
-
Bellare, M.1
Neven, G.2
-
4
-
-
20544455127
-
Transitive signatures: New schemes and proofs
-
M. Bellare, and G. Neven Transitive signatures: new schemes and proofs IEEE Trans. Inform. Theory 51 6 2005 2133 2151
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, Issue.6
, pp. 2133-2151
-
-
Bellare, M.1
Neven, G.2
-
5
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme
-
Y. Desmedt, Lecture Notes in Computer Science Springer
-
A. Boldyreva Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme Y. Desmedt, Public Key Cryptography Lecture Notes in Computer Science vol. 2567 2003 Springer 31 46
-
(2003)
Public Key Cryptography
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
6
-
-
35048848152
-
Short signatures without random oracles
-
C. Cachin, J. Camenisch, Lecture Notes in Computer Science Springer
-
D. Boneh, and X. Boyen Short signatures without random oracles C. Cachin, J. Camenisch, EUROCRYPT Lecture Notes in Computer Science vol. 3027 2004 Springer 56 73
-
(2004)
EUROCRYPT
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
J. Kilian, Lecture Notes in Computer Science Springer
-
D. Boneh, and M.K. Franklin Identity-based encryption from the Weil pairing J. Kilian, CRYPTO Lecture Notes in Computer Science vol. 2139 2001 Springer 213 229
-
(2001)
CRYPTO
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd, Lecture Notes in Computer Science Springer
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing C. Boyd, ASIACRYPT Lecture Notes in Computer Science vol. 2248 2001 Springer 514 532
-
(2001)
ASIACRYPT
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
84857696968
-
Short transitive signatures for directed trees
-
O. Dunkelman, Lecture Notes in Computer Science Springer
-
P. Camacho, and A. Hevia Short transitive signatures for directed trees O. Dunkelman, CT-RSA Lecture Notes in Computer Science vol. 7178 2012 Springer 35 50
-
(2012)
CT-RSA
, vol.7178
, pp. 35-50
-
-
Camacho, P.1
Hevia, A.2
-
10
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
G. Frey, M. Müller, and H.-G. Rück The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems IEEE Trans. Inform. Theory 45 5 1999 1717 1719
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Müller, M.2
Rück, H.-G.3
-
11
-
-
84871215812
-
Round-optimal ID-based blind signature schemes without ROS assumption
-
W. Gao, G. Wang, X. Wang, and F. Li Round-optimal ID-based blind signature schemes without ROS assumption J. Commun. 7 12 2012 909 920
-
(2012)
J. Commun.
, vol.7
, Issue.12
, pp. 909-920
-
-
Gao, W.1
Wang, G.2
Wang, X.3
Li, F.4
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R.L. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 17 2 1988 281 308
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
77249127466
-
Transitive signature scheme from LFSR
-
Z. Gong, Z. Huang, W. Qiu, and K. Chen Transitive signature scheme from LFSR J. Inform. Sci. Eng. 26 1 2010 131 143
-
(2010)
J. Inform. Sci. Eng.
, vol.26
, Issue.1
, pp. 131-143
-
-
Gong, Z.1
Huang, Z.2
Qiu, W.3
Chen, K.4
-
15
-
-
38149093703
-
Universal designated verifier signature without delegatability
-
P. Ning, S. Qing, N. Li, Lecture Notes in Computer Science Springer
-
X. Huang, W. Susilo, Y. Mu, and W. Wu Universal designated verifier signature without delegatability P. Ning, S. Qing, N. Li, ICICS Lecture Notes in Computer Science vol. 4307 2006 Springer 479 498
-
(2006)
ICICS
, vol.4307
, pp. 479-498
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Wu, W.4
-
16
-
-
44249114079
-
Secure universal designated verifier signature without random oracles
-
X. Huang, W. Susilo, Y. Mu, and W. Wu Secure universal designated verifier signature without random oracles Int. J. Inform. Security 7 3 2008 171 183
-
(2008)
Int. J. Inform. Security
, vol.7
, Issue.3
, pp. 171-183
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Wu, W.4
-
17
-
-
33750063941
-
Restricted universal designated verifier signature
-
J. Ma, H. Jin, L.T. Yang, J.J.P. Tsai, Lecture Notes in Computer Science Springer
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang Restricted universal designated verifier signature J. Ma, H. Jin, L.T. Yang, J.J.P. Tsai, UIC Lecture Notes in Computer Science vol. 4159 2006 Springer 874 882
-
(2006)
UIC
, vol.4159
, pp. 874-882
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
19
-
-
33750008172
-
Universal designated verifier signatures without random oracles or non-black box assumptions
-
R.D. Prisco, M. Yung, Lecture Notes in Computer Science Springer
-
F. Laguillaumie, B. Libert, and J.-J. Quisquater Universal designated verifier signatures without random oracles or non-black box assumptions R.D. Prisco, M. Yung, SCN Lecture Notes in Computer Science vol. 4116 2006 Springer 63 77
-
(2006)
SCN
, vol.4116
, pp. 63-77
-
-
Laguillaumie, F.1
Libert, B.2
Quisquater, J.-J.3
-
20
-
-
38149094121
-
On the soundness of restricted universal designated verifier signatures and dedicated signatures
-
J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, Lecture Notes in Computer Science Springer
-
F. Laguillaumie, and D. Vergnaud On the soundness of restricted universal designated verifier signatures and dedicated signatures J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, ISC Lecture Notes in Computer Science vol. 4779 2007 Springer 175 188
-
(2007)
ISC
, vol.4779
, pp. 175-188
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
21
-
-
33749398761
-
Universal designated verifier ring signature (proof) without random oracles
-
X. Zhou, O. Sokolsky, L. Yan, E.-S. Jung, Z. Shao, Y. Mu, D.C. Lee, D. Kim, Y.-S. Jeong, C.-Z. Xu, Lecture Notes in Computer Science Springer
-
J. Li, and Y. Wang Universal designated verifier ring signature (proof) without random oracles X. Zhou, O. Sokolsky, L. Yan, E.-S. Jung, Z. Shao, Y. Mu, D.C. Lee, D. Kim, Y.-S. Jeong, C.-Z. Xu, EUC Workshops Lecture Notes in Computer Science vol. 4097 2006 Springer 332 341
-
(2006)
EUC Workshops
, vol.4097
, pp. 332-341
-
-
Li, J.1
Wang, Y.2
-
22
-
-
81055138684
-
-
McKinsey Global Institute
-
J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, A.H. Byers, Big data: the next frontier for innovation, competition, and productivity, report, McKinsey Global Institute, 2011.
-
(2011)
Big Data: The Next Frontier for Innovation, Competition, and Productivity, Report
-
-
Manyika, J.1
Chui, M.2
Brown, B.3
Bughin, J.4
Dobbs, R.5
Roxburgh, C.6
Byers, A.H.7
-
23
-
-
84944878224
-
Transitive signature schemes
-
B. Preneel, Lecture Notes in Computer Science Springer
-
S. Micali, and R.L. Rivest Transitive signature schemes B. Preneel, CT-RSA Lecture Notes in Computer Science vol. 2271 2002 Springer 236 243
-
(2002)
CT-RSA
, vol.2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
24
-
-
42149108421
-
A simple transitive signature scheme for directed trees
-
G. Neven A simple transitive signature scheme for directed trees Theor. Comput. Sci. 396 1-3 2008 277 282
-
(2008)
Theor. Comput. Sci.
, vol.396
, Issue.1-3
, pp. 277-282
-
-
Neven, G.1
-
25
-
-
23944451783
-
Universal designated multi verifier signature schemes
-
IEEE Computer Society
-
C.Y. Ng, W. Susilo, and Y. Mu Universal designated multi verifier signature schemes ICPADS (2) 2005 IEEE Computer Society 305 309
-
(2005)
ICPADS (2)
, pp. 305-309
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
-
26
-
-
71749084231
-
Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures
-
S.F. Shahandashti, and R. Safavi-Naini Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures IET Inform. Security 3 4 2009 152 176
-
(2009)
IET Inform. Security
, vol.3
, Issue.4
, pp. 152-176
-
-
Shahandashti, S.F.1
Safavi-Naini, R.2
-
27
-
-
0345058957
-
Universal designated-verifier signatures
-
C.-S. Laih, Lecture Notes in Computer Science Springer
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk Universal designated-verifier signatures C.-S. Laih, ASIACRYPT Lecture Notes in Computer Science vol. 2894 2003 Springer 523 542
-
(2003)
ASIACRYPT
, vol.2894
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
28
-
-
35048841170
-
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
-
F. Bao, R.H. Deng, J. Zhou, Lecture Notes in Computer Science Springer
-
R. Steinfeld, H. Wang, and J. Pieprzyk Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures F. Bao, R.H. Deng, J. Zhou, Public Key Cryptography Lecture Notes in Computer Science vol. 2947 2004 Springer 86 100
-
(2004)
Public Key Cryptography
, vol.2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
29
-
-
38349062457
-
Transitive signatures from braid groups
-
K. Srinathan, C.P. Rangan, M. Yung, Lecture Notes in Computer Science Springer
-
L. Wang, Z. Cao, S. Zheng, X. Huang, and Y. Yang Transitive signatures from braid groups K. Srinathan, C.P. Rangan, M. Yung, INDOCRYPT Lecture Notes in Computer Science vol. 4859 2007 Springer 183 196
-
(2007)
INDOCRYPT
, vol.4859
, pp. 183-196
-
-
Wang, L.1
Cao, Z.2
Zheng, S.3
Huang, X.4
Yang, Y.5
-
30
-
-
84992493441
-
Directed transitive signature scheme
-
M. Abe, Lecture Notes in Computer Science Springer
-
X. Yi Directed transitive signature scheme M. Abe, CT-RSA Lecture Notes in Computer Science vol. 4377 2007 Springer 129 144
-
(2007)
CT-RSA
, vol.4377
, pp. 129-144
-
-
Yi, X.1
-
31
-
-
33744908845
-
Identity-based universal designated verifier signatures
-
T. Enokido, L. Yan, B. Xiao, D. Kim, Y.-S. Dai, L.T. Yang, Lecture Notes in Computer Science Springer
-
F. Zhang, W. Susilo, Y. Mu, and X. Chen Identity-based universal designated verifier signatures T. Enokido, L. Yan, B. Xiao, D. Kim, Y.-S. Dai, L.T. Yang, EUC Workshops Lecture Notes in Computer Science vol. 3823 2005 Springer 825 834
-
(2005)
EUC Workshops
, vol.3823
, pp. 825-834
-
-
Zhang, F.1
Susilo, W.2
Mu, Y.3
Chen, X.4
-
32
-
-
26444589650
-
Short signature and universal designated verifier signature without random oracles
-
J. Ioannidis, A.D. Keromytis, M. Yung (Eds.)
-
R. Zhang, J. Furukawa, H. Imai, Short signature and universal designated verifier signature without random oracles, in: J. Ioannidis, A.D. Keromytis, M. Yung (Eds.), ACNS, Lecture Notes in Computer Science, vol. 3531, 2005, pp. 483-498.
-
(2005)
ACNS, Lecture Notes in Computer Science
, vol.3531
, pp. 483-498
-
-
Zhang, R.1
Furukawa, J.2
Imai, H.3
|