Efficient Identity Based Ring Signature
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[2] Siu-Ming Yiu,et al. Separable and Anonymous Identity-Based Key Issuing , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[3] Fabien Laguillaumie,et al. Multi-designated Verifiers Signatures , 2004, ICICS.
[4] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[5] Dengguo Feng,et al. A Ring Signature Scheme Using Bilinear Pairings , 2004, WISA.
[6] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2007 .
[7] Joseph K. Liu,et al. On the Security Models of (Threshold) Ring Signature Schemes , 2004, ICISC.
[8] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[9] Tzong-Chen Wu,et al. An identity-based ring signature scheme from bilinear pairings , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[10] Germán Sáez,et al. New Identity-Based Ring Signature Schemes , 2004, ICICS.
[11] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2005, Int. J. Netw. Secur..
[12] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[13] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[14] Yi Mu,et al. Perfect Concurrent Signature Schemes , 2004, ICICS.
[15] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[16] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[17] Yi Mu,et al. Non-interactive Deniable Ring Authentication , 2003, ICISC.