Group-based cryptography

Results: 52



#Item
11Designated verifier signature / Random oracle / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Digital signature

An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-07 01:34:37
12Key management / Finite fields / ID-based encryption / Group signature / XTR / RSA / Digital signature / Public key certificate / Cryptography / Public-key cryptography / Electronic commerce

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
13Computing / Telecommunications engineering / Key distribution / Key management / Distributed data storage / Sensor node / Wireless ad-hoc network / Peer-to-peer / Public-key cryptography / Wireless networking / Technology / Wireless sensor network

Group-Based Key Pre-Distribution in Wireless Sensor Networks ∗ Donggang Liu CSE Department

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
14Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
15Group signature / Accumulator / Proof of knowledge / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Zero-knowledge proof / Direct Anonymous Attestation / Cryptography / Cryptographic protocols / Finite fields

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
16Software / Cyberwarfare / Attribute grammar / Attrib / Group signature / Digital signature / Cryptography / Public-key cryptography / Computing

Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1 Department of Computer Science, UNC Greensboro, Greensboro, NC 27402

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-01 11:41:31
17Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
18RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
19Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
20Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
UPDATE