Group-based cryptography

Results: 52



#Item
11An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao,

An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-07 01:34:37
12An Improved ID-based Authenticated Group Key Agreement Schemes

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
13Group-Based Key Pre-Distribution in Wireless Sensor Networks ∗ Donggang Liu CSE Department

Group-Based Key Pre-Distribution in Wireless Sensor Networks ∗ Donggang Liu CSE Department

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
14On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
15An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1  2

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
16Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1  Department of Computer Science, UNC Greensboro, Greensboro, NC 27402

Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1 Department of Computer Science, UNC Greensboro, Greensboro, NC 27402

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-01 11:41:31
17Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1  Department of Computer Science

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
18Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
19Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1  2

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
20Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti   

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21