-
2
-
-
35048900981
-
On the selection of pairing friendly groups
-
Springer-Verlag
-
Barreto P., Lynn B., Scott M. On the selection of pairing friendly groups. Proceedings of the Selected Areas in Cryptography, SAC'03, LNCS 2004, 3006:17-25. Springer-Verlag.
-
(2004)
Proceedings of the Selected Areas in Cryptography, SAC'03, LNCS
, vol.3006
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
3
-
-
77955861721
-
An Identity-Based Multisignature Scheme from the Weil Pairing
-
(ICCDA 2010).
-
Biao, W., Xiaodong, Y., Guang, Y., 2010. An Identity-Based Multisignature Scheme from the Weil Pairing. In: Proceedings of the 2010 International Conference on Computer Design and Applications (ICCDA 2010), vol. 5. pp. 585-587.
-
(2010)
Proceedings of the 2010 International Conference on Computer Design and Applications
, vol.5
, pp. 585-587
-
-
Biao, W.1
Xiaodong, Y.2
Guang, Y.3
-
4
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer-Verlag
-
Boneh D., Franklin M.K. Identity-based encryption from the Weil pairing. Proceedings of the Crypto'01, LNCS 2001, 2139:213-229. Springer-Verlag.
-
(2001)
Proceedings of the Crypto'01, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. J. Cryptol. 2004, 17(4):297-319.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
Cao X., Kou W., Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 2010, 180(15):2895-2903.
-
(2010)
Inf. Sci.
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
7
-
-
73649134313
-
Further Remarks on Identity-based RSA Multi-signature
-
Chang, Y.-F., Lai, Y.-C., Chen, M.-Y., 2009. Further Remarks on Identity-based RSA Multi-signature. In: Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia, Signal Processing, pp. 750-753.
-
(2009)
Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia, Signal Processing
, pp. 750-753
-
-
Chang, Y.-F.1
Lai, Y.-C.2
Chen, M.-Y.3
-
8
-
-
0028378975
-
Identity-based conference key broadcast schemes with authentication
-
Chen J.L., Hwang T. Identity-based conference key broadcast schemes with authentication. Comput. Secur. 1994, 13:53-57.
-
(1994)
Comput. Secur.
, vol.13
, pp. 53-57
-
-
Chen, J.L.1
Hwang, T.2
-
9
-
-
3242668605
-
Digital multi-signature scheme based on the elliptic curve cryptosystem
-
Chen T.-S., Huang K.-H., Chung Y.-F. Digital multi-signature scheme based on the elliptic curve cryptosystem. J. Comput. Sci. Technol. 2004, 19(4):570-573.
-
(2004)
J. Comput. Sci. Technol.
, vol.19
, Issue.4
, pp. 570-573
-
-
Chen, T.-S.1
Huang, K.-H.2
Chung, Y.-F.3
-
10
-
-
58049090877
-
An Efficient Certificateless Short Designated Verifier Signature Scheme
-
Chen, H., Song, R., Zhang, F., Song, F., 2008. An Efficient Certificateless Short Designated Verifier Signature Scheme. In: Proceedings of the WiCOM'08, pp. 1-6.
-
(2008)
Proceedings of the WiCOM'08
, pp. 1-6
-
-
Chen, H.1
Song, R.2
Zhang, F.3
Song, F.4
-
11
-
-
79952987257
-
A new provably secure certificateless short signature scheme
-
Choi K.Y., Park J.H., Lee D.H. A new provably secure certificateless short signature scheme. Comput. Math. Appl. 2011, 61:1760-1768.
-
(2011)
Comput. Math. Appl.
, vol.61
, pp. 1760-1768
-
-
Choi, K.Y.1
Park, J.H.2
Lee, D.H.3
-
13
-
-
34548129922
-
ID-based digital signature scheme on the elliptic curve cryptosystem
-
Chung Y.F., Huang K.H., Lai F., Chen T.S. ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 2007, 29:601-604.
-
(2007)
Comput. Stand. Interfaces
, vol.29
, pp. 601-604
-
-
Chung, Y.F.1
Huang, K.H.2
Lai, F.3
Chen, T.S.4
-
14
-
-
84878621601
-
A novel proxy signature scheme based on user hierarchical access control policy
-
Elsevier
-
Das A.K., Massand A., Patil S. A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud Univ.-Comput. Inf. Sci. 2013, Elsevier, Vol. 25:219-228.
-
(2013)
J. King Saud Univ.-Comput. Inf. Sci.
, vol.25
, pp. 219-228
-
-
Das, A.K.1
Massand, A.2
Patil, S.3
-
16
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
Du H., Wen Q. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 2009, 31(2):390-394.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.2
, pp. 390-394
-
-
Du, H.1
Wen, Q.2
-
17
-
-
0032649638
-
The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
Frey G., Muller M., Ruck H.-G. The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inf. Theory 1999, 45(5):1717-1719.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Muller, M.2
Ruck, H.-G.3
-
18
-
-
33749318258
-
Identity based multisignatures
-
Gangishetti R., Gorantla M.C., Das M.L., Saxena A. Identity based multisignatures. Informatica 2006, 17(2):177-186.
-
(2006)
Informatica
, vol.17
, Issue.2
, pp. 177-186
-
-
Gangishetti, R.1
Gorantla, M.C.2
Das, M.L.3
Saxena, A.4
-
19
-
-
84948978775
-
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves
-
Gaudry, P., 2000. An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. In Proceedings of the Advances in Cryptology (Eurocrypt'00), LNCS, vol. 1807, pp. 19-34.
-
(2000)
Proceedings of the Advances in Cryptology (Eurocrypt'00), LNCS
, vol.1807
, pp. 19-34
-
-
Gaudry, P.1
-
22
-
-
33646852592
-
An efficient certificateless signature scheme
-
Springer-Verlag
-
Gorantla M.C., Saxena A. An efficient certificateless signature scheme. Proceedings of the ICCIS'05, LNAI 2005, 3028:110-116. Springer-Verlag.
-
(2005)
Proceedings of the ICCIS'05, LNAI
, vol.3028
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena, A.2
-
24
-
-
0028762624
-
New digital signature scheme based on discrete logarithms
-
Harn L. New digital signature scheme based on discrete logarithms. Electronic Lett. 1994, 30(5):396-398.
-
(1994)
Electronic Lett.
, vol.30
, Issue.5
, pp. 396-398
-
-
Harn, L.1
-
25
-
-
44849107153
-
Efficient identity-based RSA multisignatures
-
Harn L., Ren J. Efficient identity-based RSA multisignatures. Comput. Secur. 2010, 27:12-15.
-
(2010)
Comput. Secur.
, vol.27
, pp. 12-15
-
-
Harn, L.1
Ren, J.2
-
26
-
-
84855353789
-
An ID-based proxy signature schemes without bilinear pairings
-
He D., Chen J., Hu J. An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 2011, 66(11-12):657-662.
-
(2011)
Ann. Telecommun.
, vol.66
, Issue.11-12
, pp. 657-662
-
-
He, D.1
Chen, J.2
Hu, J.3
-
27
-
-
33751113672
-
Certificateless Designated Verifier Signature Schemes
-
Huang, X., Susilo, W., Mu, Y., Zhang, F., 2006. Certificateless Designated Verifier Signature Schemes. In: Proceedings of the AINA'06, pp. 15-19.
-
(2006)
Proceedings of the AINA'06
, pp. 15-19
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
28
-
-
38149080541
-
Certificateless signature revisited
-
Springer-Verlag
-
Huang X., Mu Y., Susilo W., Wong D.S., Wu W. Certificateless signature revisited. Proceedings of the ACISP'07, LNCS 2007, 4586:308-322. Springer-Verlag.
-
(2007)
Proceedings of the ACISP'07, LNCS
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
29
-
-
84870878817
-
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
-
Islam S.H., Biswas G.P. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. Telecommun. 2012, 67(11-12):547-558.
-
(2012)
Ann. Telecommun.
, vol.67
, Issue.11-12
, pp. 547-558
-
-
Islam, S.H.1
Biswas, G.P.2
-
30
-
-
84866082164
-
Certificateless strong designated verifier multisignature scheme using bilinear pairings
-
Islam, S.H., Biswas, G. P., 2012b. Certificateless strong designated verifier multisignature scheme using bilinear pairings. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012), pp. 540-546.
-
(2012)
Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012)
, pp. 540-546
-
-
Islam, S.H.1
Biswas, G.P.2
-
31
-
-
84907333919
-
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
-
Islam S.H., Biswas G.P. Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 2013, 25:51-61.
-
(2013)
J. King Saud Univ.-Comput. Inf. Sci.
, vol.25
, pp. 51-61
-
-
Islam, S.H.1
Biswas, G.P.2
-
32
-
-
85006189366
-
A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
-
Elsevier
-
Islam S.H., Biswas G.P. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ. - Comput. Inf. Sci. 2013, Elsevier, Vol. 26:55-67.
-
(2013)
J. King Saud Univ. - Comput. Inf. Sci.
, vol.26
, pp. 55-67
-
-
Islam, S.H.1
Biswas, G.P.2
-
33
-
-
84889263311
-
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
-
Islam S.H., Biswas G.P. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 2013, doi: 10.1080/00207160.2013.776674.
-
(2013)
Int. J. Comput. Math.
-
-
Islam, S.H.1
Biswas, G.P.2
-
34
-
-
0020832088
-
A public-key cryptosystem suitable for digital multisignatures
-
Itakura K., Nakamura K. A public-key cryptosystem suitable for digital multisignatures. NEC J. Res. Dev. 1983, 71:1-8.
-
(1983)
NEC J. Res. Dev.
, vol.71
, pp. 1-8
-
-
Itakura, K.1
Nakamura, K.2
-
35
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N. Elliptic curve cryptosystem. J. Math. Comput. 1987, 48(177):203-209.
-
(1987)
J. Math. Comput.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
36
-
-
0024864204
-
Hyperelliptic cryptosystems
-
Koblitz N. Hyperelliptic cryptosystems. J. Cryptol. 1989, 1(3):139-150.
-
(1989)
J. Cryptol.
, vol.1
, Issue.3
, pp. 139-150
-
-
Koblitz, N.1
-
38
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes A.J., Okamoto T., Vanstone S.A. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 1993, 39(5):1639-1646.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
39
-
-
47349108582
-
An ID-based Multi-signature Scheme
-
Meng, T., Zhang, X., Sun, S., 2007. An ID-based Multi-signature Scheme. In: Proceedings of the IIHMSP'07, pp. 115-117.
-
(2007)
Proceedings of the IIHMSP'07
, pp. 115-117
-
-
Meng, T.1
Zhang, X.2
Sun, S.3
-
40
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer-Verlag
-
Miller V.S. Use of elliptic curves in cryptography. Proceeding of the Crypto'85, LNCS 1985, 417-426. Springer-Verlag.
-
(1985)
Proceeding of the Crypto'85, LNCS
, pp. 417-426
-
-
Miller, V.S.1
-
42
-
-
0036260890
-
Dynamic reblocking rsa-based multisignatures scheme for computer and communication networks
-
Pon S.-F., Lu E.-H., Lee J.-Y. Dynamic reblocking rsa-based multisignatures scheme for computer and communication networks. IEEE Commun. Lett. 2002, 6(1):43-44.
-
(2002)
IEEE Commun. Lett.
, vol.6
, Issue.1
, pp. 43-44
-
-
Pon, S.-F.1
Lu, E.-H.2
Lee, J.-Y.3
-
43
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Ren K., Lou W., Zeng K., Moran P.J. On broadcast authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 2007, 6(11):4136-4144.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
44
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Springer-Verlag
-
Shamir A. Identity based cryptosystems and signature schemes. Proceedings of the Crypto'84, LNCS 1984, 196:47-53. Springer-Verlag.
-
(1984)
Proceedings of the Crypto'84, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
45
-
-
85006196010
-
-
MIRACLE Library
-
Shamus Software Ltd. 1988. MIRACLE Library. Available from: http://www.shamus.ie/index.php?page=home.
-
(1988)
-
-
-
46
-
-
37549067371
-
Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order
-
Shim K.A. Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order. Comput. Stand. Interfaces 2008, 30:121-123.
-
(2008)
Comput. Stand. Interfaces
, vol.30
, pp. 121-123
-
-
Shim, K.A.1
-
47
-
-
84947727672
-
Elliptic Curve Discrete Logarithms and the Index Calculus
-
Silverman, J. H., Suzuki, J. 1998. Elliptic Curve Discrete Logarithms and the Index Calculus. In Proceedings of the Advances in Cryptology (Asiacrypt'98), LNCS, vol. 1514, pp. 110-125.
-
(1998)
Proceedings of the Advances in Cryptology (Asiacrypt'98), LNCS
, vol.1514
, pp. 110-125
-
-
Silverman, J.H.1
Suzuki, J.2
-
49
-
-
77952296047
-
Java Implementation for Pairing-Based Cryptosystems
-
Springer Verlag
-
Tan S.Y., Heng S.H., Goi B.M. Java Implementation for Pairing-Based Cryptosystems. Proceedings of the ICCSA 2010, LNCS 2010, 188-198. Springer Verlag, vol. 6019.
-
(2010)
Proceedings of the ICCSA 2010, LNCS
, vol.6019
, pp. 188-198
-
-
Tan, S.Y.1
Heng, S.H.2
Goi, B.M.3
-
50
-
-
77952712253
-
Improvement of an efficient ID-based RSA multisignature
-
Yang, F-Y., Lo, J-H., Liao, C-M., 2010. Improvement of an efficient ID-based RSA multisignature. In: Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, pp. 822-826.
-
(2010)
Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems
, pp. 822-826
-
-
Yang, F.-Y.1
Lo, J.-H.2
Liao, C.-M.3
|