A Study on Efficient ID-based Partially Blind Signature |
김현주
(성균관대학교 전기전자 및 컴퓨터공학부 정보통신보호연구실)
오수현 (성균관대학교 전기전자 및 컴퓨터공학부 정보통신보호연구실) 원동호 (성균관대학교 전기전자 및 컴퓨터공학부 정보통신보호연구실) |
1 |
Public-key Systems Based on the Difficulty of Tampering
/
|
2 |
ID-based Cryptosystem using Discrete Logarithm Problem
/
DOI ScienceOn |
3 |
A Method for Obtaining Digital Signatures and Publickey Cryptosystem
/
DOI ScienceOn |
4 |
A Randomization Enhanced Scheme for Chaum's Blind Signature
/
DOI ScienceOn |
5 |
New Direction in Cryptography
/
|
6 |
How to Date Blind Signatures
/
|
7 |
Digital Signature Standard (DSS)
/
|
8 |
Digitalized Signatures and Public-key Functions as Intractable as Factorization
/
|
9 |
/
|
10 |
On the Security of RSA Padding
/
DOI |
11 |
The Arithmatic of Elliptic Curves
/
|
12 |
New Blind Signatures Equivalent to Factorization
/
|
13 |
Low-computation Partially Blind Signatures for Electronic Cash
/
|
14 |
A New Signature Scheme Based on the DSA Giving Message Recovery
/
|
15 |
Blind Signatures for Untraceable Payments
/
|
16 |
Short Signatures from the Weil Pairing
/
|
17 |
Identity-based Crypto-systems and Signature Schemes
/
|
18 |
Identity-Based Encryption from the Weil Pairing
/
|
19 |
RSA-Based Partially Blind Signature with Low Computation
/
|
20 |
Blind Signatures Based on the Discrete Logarithm Problem
/
|
21 |
Efficient Signature Generation by Smart Cards
/
|
22 |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
/
|
23 |
An Identity-Based Signature from Gap Diffie-Hellman Groups
/
|
24 |
A Realization Scheme for the Identity Based Cryptosystem
/
|
25 |
Traceability on Low-computation Partially Blind Signatures for Elecronic Cash
/
|
26 |
A Public-key Crypto- system and a Signature Scheme Based on Discrete Logarithms
/
|
27 |
Partially Blind Signature Schemes
/
|
28 |
Untraceable Electronic Cash
/
|
29 |
Meta-Message Recovery and Meta-Blind Signatures Schemes Based on the Discrete Logarithm Problem and Their Applications
/
|
30 |
The Gap- Problems: A New Class of Problems for the Security of Cryptographic Schemes
/
|