Privacy for Private Key in Signatures (English)
- New search for: Wu, Qianhong
- New search for: Qin, Bo
- New search for: Mu, Yi
- New search for: Susilo, Willy
- New search for: Wu, Qianhong
- New search for: Qin, Bo
- New search for: Mu, Yi
- New search for: Susilo, Willy
In:
Information Security and Cryptology
3
;
84-95
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:Privacy for Private Key in Signatures
-
Contributors:
-
Published in:Information Security and Cryptology , 3 ; 84-95Lecture Notes in Computer Science ; 5487, 3 ; 84-95
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The State of Hash Functions and the NIST SHA-3 CompetitionPreneel, Bart et al. | 2009
- 12
-
Key Evolution Systems in Untrusted Update EnvironmentsLibert, Benoît / Quisquater, Jean-Jacques / Yung, Moti et al. | 2009
- 22
-
Secure and Privacy-Preserving Information BrokeringLiu, Peng et al. | 2009
- 23
-
Provably Secure Convertible Nominative Signature SchemeZhao, Wei / Lin, Changlu / Ye, Dingfeng et al. | 2009
- 41
-
Cryptanalysis of Two Ring Signcryption SchemesWang, Huaqun / Yu, Hong et al. | 2009
- 47
-
Efficient Signcryption Key Encapsulation without Random OraclesLi, Fagen / Shirase, Masaaki / Takagi, Tsuyoshi et al. | 2009
- 60
-
Strong Anonymous SignaturesZhang, Rui / Imai, Hideki et al. | 2009
- 72
-
Publicly Verifiable Privacy-Preserving Group DecryptionQin, Bo / Wu, Qianhong / Susilo, Willy / Mu, Yi et al. | 2009
- 84
-
Privacy for Private Key in SignaturesWu, Qianhong / Qin, Bo / Mu, Yi / Susilo, Willy et al. | 2009
- 96
-
Security of Truncated MACsWang, Peng / Feng, Dengguo / Lin, Changlu / Wu, Wenling et al. | 2009
- 115
-
Security Analysis of Multivariate Polynomials for HashingBettale, Luk / Faugère, Jean-Charles / Perret, Ludovic et al. | 2009
- 125
-
SPVT-II: An Efficient Security Protocol Verifier Based on Logic ProgrammingLi, MengJun / Zhou, Ti / Li, ZhouJun et al. | 2009
- 141
-
Batch ZK Proof and Verification of OR LogicPeng, Kun / Bao, Feng et al. | 2009
- 157
-
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPsCook, Debra L. / Yung, Moti / Keromytis, Angelos et al. | 2009
- 181
-
Impossible Differential Analysis of Reduced Round CLEFIAZhang, Wenying / Han, Jing et al. | 2009
- 192
-
Reducible Polynomial over $\mathbb{F}_{2}$ Constructed by Trinomial σ−LFSRZeng, Guang / Yang, Yang / Han, Wenbao / Fan, Shuqin et al. | 2009
- 201
-
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard ModelYang, Piyi / Cao, Zhenfu / Dong, Xiaolei et al. | 2009
- 217
-
Further Observations on Certificateless Public Key EncryptionWang, Xu an / Huang, Xinyi / Yang, Xiaoyuan et al. | 2009
- 240
-
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile ComputingKim, Mooseop / Ryou, Jaecheol / Jun, Sungik et al. | 2009
- 253
-
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPALiu, Duo / Tan, Zhiyong / Dai, Yiqi et al. | 2009
- 265
-
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSNCheng, Bo-Chao / Chen, Huan / Liao, Guo-Tan et al. | 2009
- 275
-
Key Predistribution Schemes Using Codes in Wireless Sensor NetworksRuj, Sushmita / Roy, Bimal et al. | 2009
- 289
-
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc NetworksLi, Fagen / Shirase, Masaaki / Takagi, Tsuyoshi et al. | 2009
- 305
-
On the Computational Efficiency of XTR+Mu, Ningbo / Hu, Yupu / Zhang, Leyou et al. | 2009
- 314
-
A Variant of Boneh-Gentry-Hamburg’s Pairing-Free Identity Based Encryption SchemeJhanwar, Mahabir Prasad / Barua, Rana et al. | 2009
- 332
-
Inter-domain Identity-Based Proxy Re-encryptionTang, Qiang / Hartel, Pieter / Jonker, Willem et al. | 2009
- 348
-
Hardening Botnet by a Rational BotmasterZhang, Zonghua / Ando, Ruo / Kadobayashi, Youki et al. | 2009
- 370
-
Separation of Duty in Trust-Based CollaborationDeng, Lingli / He, Yeping / Xu, Ziyao et al. | 2009
- 389
-
An Integrity Assurance Mechanism for Run-Time ProgramsXu, Ziyao / He, Yeping / Deng, Lingli et al. | 2009
- 406
-
A Security and Performance Evaluation of Hash-Based RFID ProtocolsLim, Tong-Lee / Li, Tieyan / Li, Yingjiu et al. | 2009
- 425
-
Correction, Optimisation and Secure and Efficient Application of PBD ShufflingPeng, Kun / Bao, Feng et al. | 2009