Author:
Rivest Ronald L.,Shamir Adi,Tauman Yael
Publisher
Springer Berlin Heidelberg
Reference45 articles.
1. Awasthi, A.K., Lal, S.: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In: Cryptology ePrint Archive: Report 2004/184
2. Lecture Notes in Computer Science;G. Ateniese,2004
3. Lecture Notes in Computer Science;M. Abe,2002
4. Lecture Notes in Computer Science;D. Boneh,2003
5. Bellare, M., Rogaway, P.: Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献