Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
46
views
18
references
Top references
cited by
29
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,333
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — ASIACRYPT 2002
ID-Based Blind Signature and Ring Signature from Pairings
other
Author(s):
Fangguo Zhang
,
Kwangjo Kim
Publication date
(Online):
November 8 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
341
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
214
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2001)
0
comments
Cited
202
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
November 8 2002
Pages
: 533-547
DOI:
10.1007/3-540-36178-2_33
SO-VID:
344138ce-d73d-46fc-8547-54570deec96e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Analysis of Bernstein’s Factorization Circuit
pp. 27
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
pp. 46
Looking beyond XTR
pp. 64
Bounds for Robust Metering Schemes and Their Relationship with A2-code
pp. 81
Unconditionally Secure Anonymous Encryption and Group Authentication
pp. 100
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
pp. 110
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
pp. 125
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
pp. 143
Efficient Oblivious Transfer in the Bounded-Storage Model
pp. 160
In How Many Ways Can You Write Rijndael?
pp. 176
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
pp. 192
Threshold Cryptosystems Based on Factoring
pp. 206
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
pp. 224
Asynchronous Secure Communication Tolerating Mixed Adversaries
pp. 243
Amplified Boomerang Attack against Reduced-Round SHACAL
pp. 254
Enhancing Differential-Linear Cryptanalysis
pp. 299
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
pp. 311
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2
pp. 328
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
pp. 346
On Unconditionally Secure Robust Distributed Key Distribution Centers
pp. 364
Short Signatures in the Random Oracle Model
pp. 379
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
pp. 397
Transitive Signatures Based on Factoring and RSA
pp. 415
1-out-of-n Signatures from a Variety of Keys
pp. 433
A Revocation Scheme with Minimal Storage at Receivers
pp. 451
Optimistic Mixing for Exit-Polls
pp. 466
Improved Construction of Nonlinear Resilient S-Boxes
pp. 484
An Upper Bound on the Number of m-Resilient Boolean Functions
pp. 497
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
pp. 515
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
pp. 533
ID-Based Blind Signature and Ring Signature from Pairings
pp. 567
Crypto-integrity
pp. 574
Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis
Similar content
3,333
XAI-IDS: toward proposing an explainable artificial Intelligence framework for enhancing network intrusion detection systems
Authors:
O. Arreche
,
T Guntur
,
M. ABDALLAH
Scientific Opinion on the substantiation of health claims related to the replacement of mixtures of saturated fatty acids (SFAs) as present in foods or diets with mixtures of monounsaturated fatty acids (MUFAs) and/or mixtures of polyunsaturated fatty acids (PUFAs), and maintenance of normal blood LDL-cholesterol concentrations (ID 621, 1190, 1203, 2906, 2910, 3065) pursuant to Article 13(1) of Regulation (EC) No 1924/2006
Authors:
EFSA Panel on Dietetic Products Nutrition and Allergies (NDA)
ILL-IDS: An incremental lifetime learning IDS for VANETs
Authors:
Yunfan Huang
,
Maode Ma
See all similar
Cited by
29
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain
Authors:
Kai Fan
,
Shangyang Wang
,
Yanhui Ren
…
Accumulators from Bilinear Pairings and Applications
Authors:
Lan Nguyen
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
Authors:
Fangguo Zhang
,
Reihaneh Safavi-Naini
,
Willy Susilo
See all cited by