Comparing two pairing-based aggregate signature schemes
From MaRDI portal
Publication:970534
Recommendations
- Unrestricted Aggregate Signatures
- Security of BLS and BGLS signatures in a multi-user setting
- Cryptology and Network Security
- Identity based aggregate signcryption schemes
- Information Security and Cryptology
- Universal signature aggregators
- Novel efficient certificateless aggregate signatures
- How to aggregate the CL signature scheme
Cites work
- scientific article; zbMATH DE number 1643939 (Why is no real title available?)
- scientific article; zbMATH DE number 5532069 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- scientific article; zbMATH DE number 1842492 (Why is no real title available?)
- scientific article; zbMATH DE number 2114384 (Why is no real title available?)
- scientific article; zbMATH DE number 1406786 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Algorithmic Number Theory
- Algorithms for black-box fields and their application to cryptography
- Discrete Logarithms in $GF ( P )$ Using the Number Field Sieve
- Discrete logarithms and local units
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient and Generalized Pairing Computation on Abelian Varieties
- Efficient pairing computation on supersingular abelian varieties
- Exponentiation in Pairing-Friendly Groups Using Homomorphisms
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Implementing cryptographic pairings
- Information Security and Cryptology - ICISC 2005
- Integer Variable χ–Based Ate Pairing
- Monte Carlo Methods for Index Computation (mod p)
- On computable isomorphisms in efficient asymmetric pairing-based systems
- On the relationship between squared pairings and plain pairings
- Pairing-Friendly Elliptic Curves of Prime Order
- Pairings for cryptographers
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications
- The Eta Pairing Revisited
- The number field sieve for integers of low weight
- Topics in Cryptology – CT-RSA 2005
- Unrestricted Aggregate Signatures
- Using number fields to compute logarithms in finite fields
Cited in
(14)- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Subgroup security in pairing-based cryptography
- Short signatures from Diffie-Hellman: realizing almost compact public key
- A comparison of MNT curves and supersingular curves
- On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
- Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
- Information Security and Cryptology
- Sequential aggregate signatures with lazy verification from trapdoor permutations
- Rai-Choo! Evolving blind signatures to the next level
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Generalised asynchronous remote key generation for pairing-based cryptosystems
- Security of BLS and BGLS signatures in a multi-user setting
This page was built for publication: Comparing two pairing-based aggregate signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q970534)