Identity-based threshold ring signature without pairings
暂无分享,去创建一个
Xiong Hu | JinJing | Qin ZhiGuang | Li FaGen
[1] Joseph K. Liu,et al. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST , 2003, ICICS.
[2] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[3] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[4] Yu-Fang Chung,et al. A Novel ID-based Threshold Ring Signature Scheme competent for Anonymity and Anti-forgery , 2006, 2006 International Conference on Computational Intelligence and Security.
[5] Paulo S. L. M. Barreto,et al. On the Selection of Pairing-Friendly Groups , 2003, Selected Areas in Cryptography.
[6] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[7] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[8] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[9] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[10] Joseph K. Liu,et al. A Separable Threshold Ring Signature Scheme , 2003, ICISC.
[11] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[14] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.