Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Security of Blind Discrete Log Signatures against Interactive Attacks
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Generalized Birthday Problem
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security of Blind Digital Signatures (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Two Topics in Hyperelliptic Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Identity-based confirmer signatures from pairings over elliptic curves
Proceedings of the 4th ACM conference on Electronic commerce
Ring signatures without random oracles
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Distributed Ring Signatures from General Dual Access Structures
Designs, Codes and Cryptography
Identity-based anonymous designated ring signatures
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Extended methodology of RS design and instances based on GIP
Journal of Computer Science and Technology
A new ring signature scheme with signer-admission property
Information Sciences: an International Journal
Self-certified signature scheme from pairings
Journal of Systems and Software
Identity-based ring signatures from RSA
Theoretical Computer Science
Convertible identity-based anonymous designated ring signatures
International Journal of Security and Networks
An efficient and secure pairing-based fair blind signature scheme with message recovery
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A pairing SW implementation for Smart-Cards
Journal of Systems and Software
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery
Computational Intelligence and Security
Linkability Analysis of Some Blind Signature Schemes
Computational Intelligence and Security
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
MFCS '08 Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Definitions of Anonymity for Ring Signatures
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
Information Security and Cryptology --- ICISC 2008
Cryptanalysis of Two Ring Signcryption Schemes
Information Security and Cryptology
An efficient and provable secure identity-based ring signcryption scheme
Computer Standards & Interfaces
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Universal Designated Verifier Signatures with Threshold-Signers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
ID-Based Adaptive Oblivious Transfer
Information Security Applications
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Linkability of some blind signature schemes
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Efficient linkable ring signatures and threshold signatures from linear feedback shift register
ICA3PP'07 Proceedings of the 7th international conference on Algorithms and architectures for parallel processing
Identity-committable signatures and their extension to group-oriented ring signatures
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
Linkable ring signatures from linear feedback shift register
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Threshold privacy preserving keyword searches
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
An efficient identity-based ring signature scheme and its extension
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Provably secure randomized blind signature scheme based on bilinear pairing
Computers & Mathematics with Applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Efficient indifferentiable hashing into ordinary elliptic curves
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Design and analysis of "flexible" k-out-of-n signatures
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
A note on an identity-based ring signature scheme with signer verifiability
Theoretical Computer Science
Deterministic encoding and hashing to odd hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Threshold ring signature without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Enhanced Certificate-Based Encryption from pairings
Computers and Electrical Engineering
Privacy protection on Vehicular Ad hoc NETworks
International Journal of Ad Hoc and Ubiquitous Computing
An efficient identity-based blind signature scheme without bilinear pairings
Computers and Electrical Engineering
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Forgeability attack of two DLP-base proxy blind signature schemes
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part II
On the generic construction of identity-based signatures with additional properties
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
On the definition of anonymity for ring signatures
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Escrowed linkability of ring signatures and its applications
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Pairing-based provable blind signature scheme without random oracles
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Separable identity-based deniable authentication: cryptographic primitive for fighting phishing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Universal designated verifier ring signature (proof) without random oracles
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Linkability of a blind signature scheme and its improved scheme
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
A study on image electronic money based on watermarking technique
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Fast and proven secure blind identity-based signcryption from pairings
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Ring signature schemes for general ad-hoc access structures
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the security models of (threshold) ring signature schemes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Cryptanalysis of a forward secure blind signature scheme with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Proof-carrying proxy certificates
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
How to leak a secret: theory and applications of ring signatures
Theoretical Computer Science
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Ring signature with designated linkability
IWSEC'06 Proceedings of the 1st international conference on Security
Online/Offline ring signature scheme
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Ring signatures: stronger definitions, and constructions without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
An efficient static blind ring signature scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Yet another forward secure signature from bilinear pairings
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
ID-Based signatures from lattices in the random oracle model
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Indifferentiable hashing to barreto---naehrig curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
Efficient self-certified signatures with batch verification
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.00 |
Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user's anonymity and the signer's privacy. They are playingan important role in buildinge-commerce. In this paper, we firstly propose an ID-based blind signature scheme and an ID-based ring signature scheme, both of which are based on the bilinear pairings. Also we analyze their security and efficiency.