Author:
Seo Seung-Hyun,Choi Kyu Young,Hwang Jung Yeon,Kim Seungjoo
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference30 articles.
1. ID-based ring signature and proxy ring signature schemes from bilinear pairings;Awasthi;International Journal of Network Security,2007
2. S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: C.S. Laih (Ed.), Proceedings of the Asiacrypt 2003, Taipei, Taiwan, November 2003, LNCS, vol. 2894, pp. 312–323.
3. D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: J. Kilian (Ed.), Proceedings of Crypto 2001, Santa Barbara, California, USA, August 2001, LNCS, vol. 2139, pp. 213–229.
4. D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: C. Boyd (Ed.), Proceedings of Asiacrypt 2001, Gold Coast, Australia, December 2001, LNCS, vol. 2248, pp. 514–532.
5. A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights. .
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献