ID-Based Ring Signature Scheme Secure in the Standard Model
暂无分享,去创建一个
[1] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[4] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[5] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[6] Brent Waters,et al. Compact Group Signatures Without Random Oracles , 2006, EUROCRYPT.
[7] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[8] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[9] Tsz Hon Yuen,et al. (Hierarchical Identity-Based) Threshold Ring Signatures , 2006, IACR Cryptol. ePrint Arch..
[10] Joseph K. Liu,et al. A Suite of ID-Based Threshold Ring Signature Schemes with Dierent Levels of Anonymity , 2005 .
[11] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[13] Aggelos Kiayias,et al. Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.
[14] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[15] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[16] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[17] Tzong-Chen Wu,et al. An identity-based ring signature scheme from bilinear pairings , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[18] Germán Sáez,et al. A provably secure ID-based ring signature scheme , 2003, IACR Cryptol. ePrint Arch..
[19] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[20] Joseph K. Liu,et al. Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.
[21] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2005, Int. J. Netw. Secur..
[22] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.