Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
45
views
18
references
Top references
cited by
29
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,981
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — ASIACRYPT 2002
ID-Based Blind Signature and Ring Signature from Pairings
other
Author(s):
Fangguo Zhang
,
Kwangjo Kim
Publication date
(Online):
November 8 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
333
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
211
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2001)
0
comments
Cited
198
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
November 8 2002
Pages
: 533-547
DOI:
10.1007/3-540-36178-2_33
SO-VID:
344138ce-d73d-46fc-8547-54570deec96e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Analysis of Bernstein’s Factorization Circuit
pp. 27
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
pp. 46
Looking beyond XTR
pp. 64
Bounds for Robust Metering Schemes and Their Relationship with A2-code
pp. 81
Unconditionally Secure Anonymous Encryption and Group Authentication
pp. 100
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
pp. 110
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
pp. 125
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
pp. 143
Efficient Oblivious Transfer in the Bounded-Storage Model
pp. 160
In How Many Ways Can You Write Rijndael?
pp. 176
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
pp. 192
Threshold Cryptosystems Based on Factoring
pp. 206
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
pp. 224
Asynchronous Secure Communication Tolerating Mixed Adversaries
pp. 243
Amplified Boomerang Attack against Reduced-Round SHACAL
pp. 254
Enhancing Differential-Linear Cryptanalysis
pp. 299
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
pp. 311
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2
pp. 328
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
pp. 346
On Unconditionally Secure Robust Distributed Key Distribution Centers
pp. 364
Short Signatures in the Random Oracle Model
pp. 379
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
pp. 397
Transitive Signatures Based on Factoring and RSA
pp. 415
1-out-of-n Signatures from a Variety of Keys
pp. 433
A Revocation Scheme with Minimal Storage at Receivers
pp. 451
Optimistic Mixing for Exit-Polls
pp. 466
Improved Construction of Nonlinear Resilient S-Boxes
pp. 484
An Upper Bound on the Number of m-Resilient Boolean Functions
pp. 497
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
pp. 515
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
pp. 533
ID-Based Blind Signature and Ring Signature from Pairings
pp. 567
Crypto-integrity
pp. 574
Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis
Similar content
2,981
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
Authors:
Rathinam Gopal
,
Velusamy Parthasarathy
Genetic characterization of 21 autosomal STR loci of Goldeneye™ DNA ID 22NC Kit in Chinese She group
Authors:
Jingyi Zhang
,
Zihao Yang
,
Xiaochun Zhang
…
Idli, an Indian fermented food: A review
Authors:
NR Reddy
,
SK Sathe
,
MD Pierson
…
See all similar
Cited by
29
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain
Authors:
Kai Fan
,
Shangyang Wang
,
Yanhui Ren
…
Accumulators from Bilinear Pairings and Applications
Authors:
Lan Nguyen
An Efficient Signature Scheme from Bilinear Pairings and Its Applications
Authors:
Fangguo Zhang
,
Reihaneh Safavi-Naini
,
Willy Susilo
See all cited by