1 |
M. Bellare, C. Namprempre, and G. Neven, Security proofs for identity-based identification and signature schemes, Advances in cryptology–EUROCRYPT 2004, 268–286, Lecture Notes in Comput. Sci., 3027, Springer, Berlin, 2004
|
2 |
E. Bresson, J. Stern, and M. Szydlo, Threshold ring signatures and applications to adhoc groups, Advances in cryptology–CRYPTO 2002, 465–480, Lecture Notes in Comput. Sci., 2442, Springer, Berlin, 2002
DOI
ScienceOn
|
3 |
J. C. Cha and J. H. Cheon, An identity-based signature from gap Diffie-Hellman groups, Public key cryptography–PKC 2003, 18–30, Lecture Notes in Comput. Sci., 2567, Springer, Berlin, 2002
DOI
|
4 |
S. S. M. Chow, S. M. Yiu, and L. C. K. Hui, Efficient identity based ring signature, ACNS 2005, 499–512, Lecture Notes in Comput. Sci., 3531, Springer-Verlang, 2005
DOI
ScienceOn
|
5 |
C. Gentry and Z. Ramzan, Identity-based aggregate signatures, Public key cryptography–PKC 2006, 257–273, Lecture Notes in Comput. Sci., 3958, Springer, Berlin, 2006
DOI
ScienceOn
|
6 |
J. Groth, R. Ostrovsky, and A. Sahai, Perfect non-interactive zero knowledge for NP, Advances in cryptology–EUROCRYPT 2006, 339–358, Lecture Notes in Comput. Sci., 4004, Springer, Berlin, 2006
DOI
|
7 |
J. Herranz and G. S´aez, New identity-based ring signature schemes, ICICS 2004, 27–39, Lecture Notes in Comput. Sci., 3269, Springer-Verlang, 2004
|
8 |
K. Lee, J. Y. Hwang, and D. H. Lee, Non-interactive identity-based DNF signature scheme and its extensions, ICISC 2008, Lecture Notes in Comput. Sci., Springer-Verlang, 2008
DOI
ScienceOn
|
9 |
W. Diffe and M. E. Hellman, New directions in cryptography, IEEE Trans. Information Theory IT-22 (1976), no. 6, 644–654
DOI
|
10 |
X. Boyen, Mesh signatures: how to leak a secret with unwitting and unwilling participants, Advances in cryptology–EUROCRYPT 2007, 210–227, Lecture Notes in Comput. Sci., 4515, Springer, Berlin, 2007
DOI
ScienceOn
|
11 |
V.Goyal, O. Pandey, A. Sahai, and B.Waters, Attribute based encryption for fine-graned access control of encrypted data, ACM conference on Computer and Communications Security (ACM CCS), 89–98, 2006
|
12 |
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, Proceedings of the IEEE Symposium on Security and Privacy, 321–334, 2007
DOI
|
13 |
H. Shacham and B. Waters, Efficient ring signatures without random oracles, Public key cryptography–PKC 2007, 166–180, Lecture Notes in Comput. Sci., 4450, Springer, Berlin, 2007
DOI
ScienceOn
|
14 |
A. Shamir, Identity-based cryptosystems and signaure shcemes, CRYPTO 1984, 47–53, Lecture Notes in Comput. Sci., 196, Springer-Verlang, 1984
DOI
|
15 |
B. Waters, Efficient identity-based encryption without random oralces, EUROCRYPT 2005, 114–127, Lecture Notes in Comput. Sci., 3494, Springer-Verlang, 2005
DOI
|
16 |
D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF formulas on ciphertexts, Theory of cryptography, 325–341, Lecture Notes in Comput. Sci., 3378, Springer, Berlin, 2005
|
17 |
A. Beimel, Secure schemes for secret sharing and key distribution, Ph. D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996
|
18 |
R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, ACM conference on Computer and Communications Security (ACM CCS), 195–203, 2007
DOI
|
19 |
R. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, Advances in cryptology– ASIACRYPT 2001 (Gold Coast), 552–565, Lecture Notes in Comput. Sci., 2248, Springer, Berlin, 2001
|
20 |
R. S. Sandhu, E. J. Coyne, and C. E. Youman, Role-based access control models, IEEE Computer 29 (1996), no 2, 38–47
DOI
ScienceOn
|
21 |
A. Bender, J. Katz, and R. Morselli, Ring signatures: Stronger definitions, and constructions without random oracles, In TCC 2006, 60–79, Lecture Notes in Comput. Sci., 3876, Springer-Verlang, 2007
DOI
ScienceOn
|
22 |
F. Hess, Efficient identity based signature schemes based on pairings, Selected areas in cryptography, 310–324, Lecture Notes in Comput. Sci., 2595, Springer, Berlin, 2003
DOI
ScienceOn
|
23 |
F. Zhang and K. Kim, ID-based blind signature and ring signature from pairings, Advances in cryptology–ASIACRYPT 2002, 533–547, Lecture Notes in Comput. Sci., 2501, Springer, Berlin, 2002
DOI
ScienceOn
|
24 |
L. Nguyen, Accumulators from bilinear pairings and applications, Topics in cryptology–CT-RSA 2005, 275–292, Lecture Notes in Comput. Sci., 3376, Springer, Berlin, 2005
|
25 |
A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in cryptology–EUROCRYPT 2005, 457–473, Lecture Notes in Comput. Sci., 3494, Springer, Berlin, 2005
|