File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/11533733_10
- Scopus: eid_2-s2.0-33646033139
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Identity based ring signature: Why, how and what next
Title | Identity based ring signature: Why, how and what next |
---|---|
Authors | |
Keywords | Bilinear pairings Identity based cryptography PKI Ring signature Spontaneous anonymous group signature |
Issue Date | 2005 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 144-161 How to Cite? |
Abstract | This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspectives. It is well known that ID-based cryptosystems provide some advantages that traditional public key infrastructure (PKI) cannot achieve. What advantages do ID-based ring signature schemes possess that PKI-based schemes do not? Many ID-based ring signature schemes have been proposed. What is the design philosophy behind existing ID-based ring signature schemes? This paper summarizes the study of ID-based ring signature schemes in the literature, investigates their relationships with other existing cryptographic schemes, describes the extension of ID-based ring signature schemes and the related supporting protocol, reviews the state-of-the-art and discusses a number of interesting open problems. © Springer-Verlag Berlin Heidelberg 2005. |
Persistent Identifier | http://hdl.handle.net/10722/93192 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SSM | en_HK |
dc.contributor.author | Lui, RWC | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-09-25T14:53:41Z | - |
dc.date.available | 2010-09-25T14:53:41Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3545 LNCS, p. 144-161 | en_HK |
dc.identifier.issn | 0302-9743 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93192 | - |
dc.description.abstract | This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspectives. It is well known that ID-based cryptosystems provide some advantages that traditional public key infrastructure (PKI) cannot achieve. What advantages do ID-based ring signature schemes possess that PKI-based schemes do not? Many ID-based ring signature schemes have been proposed. What is the design philosophy behind existing ID-based ring signature schemes? This paper summarizes the study of ID-based ring signature schemes in the literature, investigates their relationships with other existing cryptographic schemes, describes the extension of ID-based ring signature schemes and the related supporting protocol, reviews the state-of-the-art and discusses a number of interesting open problems. © Springer-Verlag Berlin Heidelberg 2005. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_HK |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_HK |
dc.subject | Bilinear pairings | en_HK |
dc.subject | Identity based cryptography | en_HK |
dc.subject | PKI | en_HK |
dc.subject | Ring signature | en_HK |
dc.subject | Spontaneous anonymous group signature | en_HK |
dc.title | Identity based ring signature: Why, how and what next | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/11533733_10 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33646033139 | en_HK |
dc.identifier.hkuros | 103632 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33646033139&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 3545 LNCS | en_HK |
dc.identifier.spage | 144 | en_HK |
dc.identifier.epage | 161 | en_HK |
dc.publisher.place | Germany | en_HK |
dc.identifier.scopusauthorid | Chow, SSM=8980575500 | en_HK |
dc.identifier.scopusauthorid | Lui, RWC=8980575800 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.issnl | 0302-9743 | - |