ID-based, blind signature and ring signature from pairings

Cited 307 time in webofscience Cited 0 time in scopus
  • Hit : 383
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2013-03-05T04:23:55Z-
dc.date.available2013-03-05T04:23:55Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2002-
dc.identifier.citationADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/85475-
dc.description.abstractRecently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several. identity based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user's anonymity and the signer's privacy.-They are playing an important role in building e-commerce. In this paper, we firstly propose an ID-based blind signature scheme And an ID-based ring signature scheme, both of Which are based on the bilinear pairings. Also we analyze their security and efficiency.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.subjectDISCRETE LOGARITHM-
dc.subjectDIGITAL-SIGNATURES-
dc.subjectPROTOCOL-
dc.subjectSECURITY-
dc.titleID-based, blind signature and ring signature from pairings-
dc.typeArticle-
dc.identifier.wosid000182854800033-
dc.identifier.scopusid2-s2.0-78649971368-
dc.type.rimsART-
dc.citation.volume2501-
dc.citation.beginningpage533-
dc.citation.endingpage547-
dc.citation.publicationnameADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.type.journalArticleArticle; Proceedings Paper-
dc.subject.keywordAuthorblind signature-
dc.subject.keywordAuthorring signature-
dc.subject.keywordAuthorbilinear pairings-
dc.subject.keywordAuthorID-based cryptography-
dc.subject.keywordAuthorprovably security-
dc.subject.keywordPlusDISCRETE LOGARITHM-
dc.subject.keywordPlusDIGITAL-SIGNATURES-
dc.subject.keywordPlusPROTOCOL-
dc.subject.keywordPlusSECURITY-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 307 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0