ID-Based Restrictive Partially Blind Signatures
暂无分享,去创建一个
[1] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[2] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[3] Joonsang Baek,et al. Identity-based threshold signature scheme from the bilinear pairings (extended abstract) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[6] Siu-Ming Yiu,et al. Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.
[7] Colin Boyd,et al. A Provably Secure Restrictive Partially Blind Signature Scheme , 2002, Public Key Cryptography.
[8] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[9] Rafail Ostrovsky,et al. Security of blind digital signatures , 1997 .
[10] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[11] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[12] Kaoru Kurosawa,et al. From Digital Signature to ID-based Identification/Signature , 2004, Public Key Cryptography.
[13] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[14] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[15] Rafail Ostrovsky,et al. Security of Blind Digital Signatures (Extended Abstract) , 1997, CRYPTO.
[16] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[17] David Pointcheval,et al. Strengthened Security for Blind Signatures , 1998, EUROCRYPT.
[18] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[19] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[20] Masayuki Abe,et al. How to Date Blind Signatures , 1996, ASIACRYPT.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[23] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[24] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[25] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[26] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[27] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[28] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[29] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[30] Tatsuaki Okamoto,et al. Provably Secure Partially Blind Signatures , 2000, CRYPTO.
[31] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.