Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
20
references
Top references
cited by
23
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,150
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Aggregate Signatures
other
Author(s):
Craig Gentry
,
Zulfikar Ramzan
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Transnational Chinese identity
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
331
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2001)
0
comments
Cited
198
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 257-273
DOI:
10.1007/11745853_17
SO-VID:
3398e7b8-a248-466d-b434-7cfae6cc5ef8
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Attacks on RSA with Small Secret CRT-Exponents
pp. 14
An Attack on a Modified Niederreiter Encryption Scheme
pp. 27
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
pp. 44
Efficient Polynomial Operations in the Shared-Coefficients Setting
pp. 58
Generic On-Line/Off-Line Threshold Signatures
pp. 75
Linear Integer Secret Sharing and Distributed Exponentiation
pp. 91
Encoding-Free ElGamal Encryption Without Random Oracles
pp. 105
Parallel Key-Insulated Public Key Encryption
pp. 123
Provably Secure Steganography with Imperfect Sampling
pp. 140
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
pp. 157
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
pp. 174
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
pp. 191
Efficient Scalar Multiplication by Isogeny Decompositions
pp. 229
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pp. 241
Generalization of the Selective-ID Security Model for HIBE Protocols
pp. 257
Identity-Based Aggregate Signatures
pp. 274
On the Limitations of the Spread of an IBE-to-PKE Transformation
pp. 290
Inoculating Multivariate Schemes Against Differential Attacks
pp. 302
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
pp. 315
High-Order Attacks Against the Exponent Splitting Protection
pp. 330
New Online/Offline Signature Schemes Without Random Oracles
pp. 347
Anonymous Signature Schemes
pp. 364
The Power of Identification Schemes
pp. 378
Security Analysis of KEA Authenticated Key Exchange Protocol
pp. 395
SAS-Based Authenticated Key Agreement
pp. 410
The Twist-AUgmented Technique for Key Exchange
pp. 427
Password-Based Group Key Exchange in a Constant Number of Rounds
pp. 443
Conditional Oblivious Cast
pp. 458
Efficiency Tradeoffs for Malicious Two-Party Computation
pp. 474
On Constructing Certificateless Cryptosystems from Identity Based Encryption
pp. 491
Building Better Signcryption Schemes with Tag-KEMs
pp. 508
Security-Mediated Certificateless Cryptography
pp. 525
k-Times Anonymous Authentication with a Constant Proving Cost
Similar content
3,150
Novel aggregated multiposition noncontact mapping of atrial tachycardia in humans: From computational modeling to clinical validation
Authors:
Rui Shi
,
Junaid Zaman
,
Zhong Chen
…
Not All Followers Socially Learn from Ethical Leaders: The Roles of Followers’ Moral Identity and Leader Identification in the Ethical Leadership Process
Authors:
Zhen Wang
,
Lu Xing
,
Haoying Xu
…
Tumor-Infiltrating Immune Cell Signature Predicts the Prognosis and Chemosensitivity of Patients With Pancreatic Ductal Adenocarcinoma
Authors:
Yuzhen Gao
,
Shipeng Chen
,
Somayeh Vafaei
…
See all similar
Cited by
23
Identity-Based Aggregate Signatures
Authors:
Craig Gentry
,
Zulfikar Ramzan
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
Authors:
Mohamed Amine Ferrag
,
Leandros Maglaras
,
Ahmed Ahmim
Compact Multi-signatures for Smaller Blockchains
Authors:
Dan Boneh
,
Manu Drijvers
,
Gregory Neven
See all cited by