DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Fangguo | - |
dc.contributor.author | Kim, Kwangjo | - |
dc.date.accessioned | 2010-04-21T05:34:53Z | - |
dc.date.available | 2010-04-21T05:34:53Z | - |
dc.date.issued | 2002 | - |
dc.identifier.citation | Lecture Notes in Computer Science, Vol.2501, pp.629-637 | en |
dc.identifier.isbn | 978-3-540-00171-3 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/17861 | - |
dc.description.abstract | Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. They are playing an important role in building e-commerce. In this paper, we firstly propose an ID-based blind signature scheme and an ID-based ring signature scheme, both of which are based on the bilinear pairings. Also we analyze their security and efficiency. | en |
dc.language.iso | en_US | en |
dc.publisher | Springer Verlag (Germany) | en |
dc.subject | Blind signature | en |
dc.subject | Ring signature | en |
dc.subject | Bilinear pairings | en |
dc.subject | ID-based cryptography | en |
dc.subject | Provably security | en |
dc.title | ID-Based Blind Signature and Ring Signature from Pairings | en |
dc.type | Article | en |
dc.identifier.doi | 10.1007/3-540-36178-2_33 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.