Author:
Bellare Mihir,Namprempre Chanathip,Neven Gregory
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;M. Abdalla,2002
2. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes (February 2004), http://www.cse.ucsd.edu/users/mihir/crypto-research-papers.html
3. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. J. Cryptology 16(3), 185–215 (2003)
4. Lecture Notes in Computer Science;M. Bellare,2002
5. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM (ed.) Proc. of the 1st CCS, November 1993, pp. 62–73. ACM Press, New York (1993)
Cited by
136 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Tightly Secure ID-based Authenticated Key Exchange;Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop;2024-07
2. Pairing-Free Certificateless Signature Scheme Based on SM2 Algorithm;Communications in Computer and Information Science;2024
3. A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity;Malaysian Journal of Mathematical Sciences;2023-12-14
4. Identity-Based Threshold Signatures from Isogenies;Cryptography and Coding;2023-12-04
5. A Decentralized Mail Using Blockchain;2023 4th International Conference for Emerging Technology (INCET);2023-05-26