Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Weaknesses in some multisignature schemes for specified group of verifiers
Information Processing Letters
An identity-based society oriented signature scheme with anonymous signers
Information Processing Letters
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers"
Information Processing Letters
Group-oriented signature scheme with distinguished signing authorities
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
An improvement of delegated multisignature scheme with document decomposition
ACM SIGOPS Operating Systems Review
Multi-signatures in the plain public-Key model and a general forking lemma
Proceedings of the 13th ACM conference on Computer and communications security
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Identity Based Multisignatures
Informatica
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Attack on digital multi-signature scheme based on elliptic curve cryptosystem
Journal of Computer Science and Technology
Efficient discrete logarithm based multi-signature scheme in the plain public key model
Designs, Codes and Cryptography
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On the efficiency of group signatures providing information-theoretic anonymity
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A secure mobile agent system using multi-signature scheme in electronic commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
On the sequentiality of three optimal structured multisignature schemes
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Crypto topics and applications II
Algorithms and theory of computation handbook
How to aggregate the CL signature scheme
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Formal security model of multisignatures
ISC'06 Proceedings of the 9th international conference on Information Security
ID-Based series-parallel multisignature schemes for multi-messages from bilinear maps
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |