×

Found 99 Documents (Results 1–99)

Provably secure identity based provable data possession. (English) Zbl 1388.94087

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 310-325 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient privacy-preserving e-coupon system. (English) Zbl 1368.94114

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 3-15 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new public remote integrity checking scheme with user privacy. (English) Zbl 1368.94097

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 377-394 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Improved identity-based online/offline encryption. (English) Zbl 1358.94067

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 160-173 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

A new general framework for secure public key encryption with keyword search. (English) Zbl 1358.94060

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 59-76 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption. (English) Zbl 1443.94061

Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 73-90 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. (English) Zbl 1291.94003

Lecture Notes in Computer Science 8544. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). xiv, 464 p. (2014).
PDFBibTeX XMLCite
Full Text: DOI

Anonymous signcryption against linear related-key attacks. (English) Zbl 1283.94060

Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23–25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 165-183 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

\(k\)-time proxy signature: formal definition and efficient construction. (English) Zbl 1283.94096

Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23–25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 154-164 (2013).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Membership encryption and its applications. (English) Zbl 1316.94076

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 219-234 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient self-certified signatures with batch verification. (English) Zbl 1292.94100

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 179-194 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. (English) Zbl 1245.94010

Lecture Notes in Computer Science 7372. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). xiv, 460 p. (2012).
PDFBibTeX XMLCite
Full Text: DOI

A pre-computable signature scheme with efficient verification for RFID. (English) Zbl 1292.68052

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 1-16 (2012).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient online/offline signatures with computational leakage resilience in online phase. (English) Zbl 1295.94179

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 455-470 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Electronic cash with anonymous user suspension. (English) Zbl 1295.94008

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 172-188 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Policy-based authentication for mobile agents. (English) Zbl 1326.94133

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 123-137 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Towards a cryptographic treatment of publish/subscribe systems. (English) Zbl 1294.94086

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 201-220 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Enhanced security notions for dedicated-key hash functions: definitions and relationships. (English) Zbl 1285.94093

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 192-211 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Further observations on optimistic fair exchange protocols in the multi-user setting. (English) Zbl 1279.94088

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 124-141 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Server-controlled identity-based authenticated key exchange. (English) Zbl 1267.94120

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 214-229 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? (English) Zbl 1267.94114

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 129-139 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

How to prove security of a signature with a tighter security reduction. (English) Zbl 1267.94119

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 90-103 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal designated verifier signatures with threshold-signers. (English) Zbl 1287.94116

Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 89-109 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Enhanced target collision resistant hash functions revisited. (English) Zbl 1248.94089

Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 327-344 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient non-interactive range proof. (English) Zbl 1248.94098

Ngo, Hung Q. (ed.), Computing and combinatorics. 15th annual international conference, COCOON 2009, Niagara Falls, NY, USA, July 13–15, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02881-6/pbk). Lecture Notes in Computer Science 5609, 138-147 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. (English) Zbl 1284.94104

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 153-170 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Asymmetric group key agreement. (English) Zbl 1239.94078

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 153-170 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy for private key in signatures. (English) Zbl 1237.94099

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 84-95 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Publicly verifiable privacy-preserving group decryption. (English) Zbl 1237.94090

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 72-83 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. (English) Zbl 1237.94048

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 295-308 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Concurrent signatures without a conventional keystone. (English) Zbl 1157.94371

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 196-213 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based online/offline encryption. (English) Zbl 1175.94080

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 247-261 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Multi-identity single-key decryption without random oracles. (English) Zbl 1166.94312

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 384-398 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Provably secure identity-based undeniable signatures with selective and universal convertibility. (English) Zbl 1166.94345

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 25-39 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Server-aided verification signatures: Definitions and new constructions. (English) Zbl 1204.94093

Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 141-155 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimal online/offline signature: how to sign a message without online computation. (English) Zbl 1204.94086

Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 98-111 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Sanitizable signatures revisited. (English) Zbl 1362.94059

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 80-97 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. (English) Zbl 1139.94300

Lecture Notes in Computer Science 5107. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). xiii, 480 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Information security practice and experience. 4th international conference, ISPEC 2008, Sydney, Australia, April 21–23, 2008. Proceedings. (English) Zbl 1158.68303

Lecture Notes in Computer Science 4991. Berlin: Springer (ISBN 978-3-540-79103-4/pbk). xiii, 420 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Formal definition and construction of nominative signature. (English) Zbl 1285.94108

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 57-68 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

New construction of group secret handshakes based on pairings. (English) Zbl 1285.94103

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 16-30 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient generic on-line/off-line signatures without key exposure. (English) Zbl 1214.94061

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 18-30 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Practical compact e-cash. (English) Zbl 1213.68244

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 431-445 (2007).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Certificateless signature revisited. (English) Zbl 1213.94158

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 308-322 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. (English) Zbl 1137.94001

Lecture Notes in Computer Science 4784. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). x, 237 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

A generic construction for universally-convertible undeniable signatures. (English) Zbl 1282.94079

Bao, Feng (ed.) et al., Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). Lecture Notes in Computer Science 4856, 15-33 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Mutative identity-based signatures or dynamic credentials without random oracles. (English) Zbl 1282.94077

Bao, Feng (ed.) et al., Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). Lecture Notes in Computer Science 4856, 1-14 (2007).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. (English) Zbl 1151.94608

Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 392-406 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Provably secure pairing-based convertible undeniable signature with short signature length. (English) Zbl 1151.94610

Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 367-391 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-party stand-alone and setup-free verifiably committed signatures. (English) Zbl 1127.94381

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 134-149 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A new signature scheme without random oracles from bilinear pairings. (English) Zbl 1295.94192

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 67-80 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient partially blind signatures with provable security. (English) Zbl 1171.94366

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 345-354 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. (English) Zbl 1151.94302

Lecture Notes in Computer Science 4301. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). xiii, 381 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Constant-size dynamic \(k\)-TAA. (English) Zbl 1152.94445

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 111-125 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient provably secure restrictive partially blind signatures from bilinear pairings. (English) Zbl 1152.94409

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 251-265 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Compact e-cash from bounded accumulator. (English) Zbl 1177.94179

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 178-195 (2006).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Online/offline signatures and multisignatures for aodv and dsr routing security. (English) Zbl 1176.94062

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 99-110 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

An efficient static blind ring signature scheme. (English) Zbl 1185.94084

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 410-423 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the security of certificateless signature schemes from Asiacrypt 2003. (English) Zbl 1154.94459

Desmedt, Yvo G. (ed.) et al., Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30849-0/pbk). Lecture Notes in Computer Science 3810, 13-25 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. (English) Zbl 1098.94002

Lecture Notes in Computer Science 3810. Berlin: Springer (ISBN 3-540-30849-0/pbk). xi, 349 p. (2005).
PDFBibTeX XMLCite
Full Text: DOI

On the security of nominative signatures. (English) Zbl 1127.94373

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 329-335 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based partial message recovery signatures (or how to shorten ID-based signatures). (English) Zbl 1120.94334

Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 45-56 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive deniable ring authentication. (English) Zbl 1092.94515

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 386-401 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based strong designated verifier signature schemes. (English) Zbl 1098.94630

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 313-324 (2004).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Perfect concurrent signature schemes. (English) Zbl 1109.68487

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 14-26 (2004).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Deniable partial proxy signatures. (English) Zbl 1115.94307

Maher, Michael J. (ed.), Advances in computer science – ASIAN 2004. Higher-level decision making. 9th Asian computing science conference. Dedicated to Jean-Louis Lassez on the occasion of his 5th cycle birthday, Chiang Mai, Thailand, December 8–10, 2004. Proceedings. Berlin: Springer (ISBN 3-540-24087-X/pbk). Lecture Notes in Computer Science 3321, 182-194 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based authenticated broadcast encryption and distributed authenticated encryption. (English) Zbl 1115.68407

Maher, Michael J. (ed.), Advances in computer science – ASIAN 2004. Higher-level decision making. 9th Asian computing science conference. Dedicated to Jean-Louis Lassez on the occasion of his 5th cycle birthday, Chiang Mai, Thailand, December 8–10, 2004. Proceedings. Berlin: Springer (ISBN 3-540-24087-X/pbk). Lecture Notes in Computer Science 3321, 169-181 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Deniable ring authentication revisited. (English) Zbl 1103.68539

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 149-163 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based broadcasting. (English) Zbl 1123.94379

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 177-190 (2003).
MSC:  94A62 94A05
PDFBibTeX XMLCite
Full Text: DOI

Robust and secure broadcasting. (English) Zbl 1011.94550

Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 223-231 (2001).
MSC:  94A60
PDFBibTeX XMLCite

Distributed signcryption. (English) Zbl 0963.94032

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 155-164 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software