IDB (Identity-Based) Crypto References
[AL03] G. Appenzeller & B. Lynn, "Minimal-Overhead IP Security using Identity-Based Encryption," submitted preprint, 2003.
[AM03] G. Ateniese
& B. de Medeiros, "Identity-based Chameleon Hash and
Applications,"
[AM04] G. Ateniese & B. de Medeiros, "A Provably Secure Nyberg-Rueppel Signature Variant with Applications," Cryptology ePrint Archive, Report 2004/093.
[AP02] S. S.
Al-Riyami & K. G. Paterson, "Tripartite Authenticated Key Agreement
Protocols from Pairings,"
[AP03] S. S.
Al-Riyami & K. G. Paterson, "Certificateless Public Key
Cryptography,"
[B02a] A.
Boldyreva, "Efficient threshold signature, multisignature and blind signature
schemes based on the Gap-Diffie-Hellman-group signature scheme,"
[B02b] M. Baldwin, "Identity Based Encryption from the Tate Pairing to Secure Email Communications," Master Thesis, University of Bristol, 2002.
[B03a] P. S. L. M. Barreto, "Criptografia Robusta e Marcas d'Água Frágeis: Construção e Análise de Algoritmos para Localizar Alterações em Imagens Digitais," PhD Thesis (in Portuguese), Universidade de São Paulo, Escola Politécnica, 2003.
[B03b] W. D. Benits Jr., "Sistemas Criptográficos Baseados em Identidades Pessoais," Master Thesis (in Portuguese), Universidade de São Paulo, Instituto de Matemática e Estatística, 2003.
[B03c] X. Boyen,
"Multipurpose Identity-Based Signcryption: A Swiss Army Knife for
Identity-Based Cryptography,"
[BB04a] D. Boneh
& X. Boyen, "Efficient Selective-ID Secure Identity Based Encryption
Without Random Oracles,"
[BB04b] D. Boneh
& X. Boyen, "Short Signatures Without Random Oracles,"
[BB04c] D. Boneh
& X. Boyen, "Secure Identity Based Encryption Without Random
Oracles,"
[BBS01] D. Boneh,
X. Boyen & H. Shacham, "Short Signatures from the Weil pairings,"
[BBS04] D. Boneh,
X. Boyen & H. Shacham, "Short Group Signatures,"
[BCOP04] D. Boneh,
G. Di Crescenzo, R. Ostrovsky & G. Persiano, "Public key encryption
with keyword search,"
[BDD04] A. Burnett, A. Duffy & T. Dowling, "A Biometric Identity Based Signature Scheme," Cryptology ePrint Archive, Report 2004/176.
[BDS03] R. Barua,
R. Dutta & P. Sarkar, "Extending Joux's Protocol to Multi-Party Key
Agreement," 2904, Springer-Verlag (2003), pp. 205-217. See also Cryptology ePrint
Archive, Report 2003/062.
[BDS04] R. Barua, R. Dutta & P. Sarkar, "Provably Secure Authenticated Tree Based Group Key Agreement Protocol using Pairing," Cryptology ePrint Archive, Report 2004/090.
[BDSSSW03] D.
Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon & H. C. Wong,
"Secret Handshakes from Pairing-Based Key Agreements,"
[BF01] D. Boneh
& M. Franklin, "Identity-based encryption from the Weil pairing,"
[BGKOPW03] G.
Bertoni, J. Guajardo, S. Kumar, G. Orlando, C. Paar & T. Wollinger,
"Efficient GF( Topics in Cryptology - CT-RSA 2003, LNCS 2612,
Springer-Verlag (2003), pp. 158-175.
[BGLS03a] D.
Boneh, C. Gentry, B. Lynn & H. Shacham, "Aggregate and Verifiably
Encrypted Signatures from Bilinear Maps,"
[BGLS03b] D.
Boneh, C. Gentry, B. Lynn & H. Shacham, "A Survey of Two Signature
Aggregation Techniques," CryptoBytes
[BHS04] R. Bradshaw, J. Holt & K. Seamons, "Concealing Complex Policies with Hidden Credentials," Cryptology ePrint Archive, Report 2004/109.
[BKLS02] P. S. L.
M. Barreto, H. Y. Kim, B. Lynn & M. Scott, "Efficient Algorithms for
Pairing-Based Cryptosystems,"
[BLS01] D. Boneh, B. Lynn & H. Shacham, “Short signatures from the Well pairing” in Advances in Cryptology - AsiaCrypt 2001, Lecture Notes in Computer Science, Vol. 2Q48, Springer-Verlag, 2001, pp. 514-532.
[BLS02] P. S. L.
M. Barreto, B. Lynn & M. Scott, "Constructing Elliptic Curves with
Prescribed Embedding Degrees,"
[BLS03] P. S. L.
M. Barreto, B. Lynn & M. Scott, "On the Selection of Pairing-Friendly
Groups,"
[BMP03] C. Boyd,
W. Mao & K. Paterson, "Deniable authenticated key establishment for
internet protocols,"
[BMP04] C. Boyd,
W. Mao & K. Paterson, "Key agreement using statically keyed
authenticators,"
[BMS03] D. Boneh,
I. Mironov & V. Shoup, "A Secure Signature Scheme from Bilinear
Maps,"
[BMX04] I. Blake, K. Murty & G. Xu, "Refinements of Miller's Algorithm for Computing Weil/Tate Pairing," Cryptology ePrint Archive, Report 2004/065.
[BNN04] M.
Bellare, C. Namprempre & G. Neven, "Security Proofs for Identity-Based
Identification and Signature Schemes," [BP02] M. Bellare & A. Palacio, "Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold," Cryptology ePrint Archive, Report 2002/064.
[BPW03] A. Boldyreva, A. Palacio & B. Warinschi, "Secure Proxy Signature Schemes for Delegation of Signing Rights," Cryptology ePrint Archive, Report 2003/096.
[BS02] D. Boneh
& A. Silverberg, "Applications of Multi-linear Forms to
Cryptography,"
[BT04] W. D. Benits, Jr. & R. Terada, "An IBE Scheme to Exchange Authenticated Secret Keys," Cryptology ePrint Archive, Report 2004/071.
[BW03] F. Brezing, A. Weng, "Elliptic curves suitable for pairing based cryptography," Cryptology ePrint Archive, Report 2003/143.
[BZ03] J. Baek, Y.
Zheng, "Identity-Based Threshold Decryption,"
[C02a] C. Castelluccia, "How to convert any ID-based Signature Scheme into a Group Signature Scheme," Cryptology ePrint Archive, Report 2002/116.
[C02b] J. H. Cheon, "A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack," Cryptology ePrint Archive, Report 2002/028.
[C03] Z. Chen, "Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols," Cryptology ePrint Archive, Report 2003/103.
[CB03] M. Casassa Mont, P. Bramhall, "IBE Applied to Privacy and Identity Management," Hewlett-Packard Laboratories, technical report HPL-2003-101, 2003.
[CBDH03] M. Casassa Mont, P. Bramhall, C. R. Dalton, K. Harrison, "A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial," Hewlett-Packard Laboratories, technical report HPL-2003-21, 2003.
[CC02] J. C. Cha,
J. H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman
Groups,"
[CGHYC04] S. S. M.
Chow, H. W. Go, L. C. K. Hui, S. M. Yiu, K. P. Chow, "Two Forward-Secure
Threshold Signature Schemes,"
[CHK03a] R.
Canetti, S. Halevi, J. Katz, "A Forward-Secure Public-Key Encryption
Scheme,"
[CHK03b] R. Canetti, S. Halevi, J. Katz, "Chosen-Ciphertext Security from Identity-Based Encryption," Cryptology ePrint Archive, Report 2003/182.
[CHL04] K. Y.
Choi, J. Y. Hwang, D. H. Lee, "Efficient ID-based Group Key Agreement with
Bilinear Maps,"
[CHMSS02] L. Chen,
K. Harrison, A. Moss, N. P. Smart, D. Soldera, "Certification of public
keys within an identity based system,"
[CHSS02] L. Chen,
K. Harrison, N. P. Smart, D. Soldera, "Applications of multiple trust
authorities in pairing based cryptosystems,"
[CHYC03] S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, "A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks," Cryptology ePrint Archive, Report 2003/262.
[CHY04] S. S. M. Chow, L. C. K. Hui, S. M. Yiu, "Identity Based Threshold Ring Signature," Cryptology ePrint Archive, Report 2004/179.
[CHYC04] S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, "Two Improved Partially Blind Signature Schemes from Bilinear Pairings," Cryptology ePrint Archive, Report 2004/108.
[CK02] L. Chen, C. Kudla, "Identity Based Authenticated Key Agreement from Pairings," Cryptology ePrint Archive, Report 2002/184.
[CKY04] J. H. Cheon, Y. Kim, H. J. Yoon, "A New ID-based Signature with Batch Verification," Cryptology ePrint Archive, Report 2004/131.
[CL02] J. H. Cheon, D. H. Lee, "Diffie-Hellman Problems and Bilinear Maps," Cryptology ePrint Archive, Report 2002/117.
[CL03] Y. J.
Choie, E. Lee, "Implementation of Tate Pairing on Hyperelliptic Curves of
Genus 2," 2971,
Springer-Verlag (2004), pp. 97-111.
[CL04] J.
Camenisch, A. Lysyanskaya, "Signature Schemes and Anonymous Credentials
from Bilinear Maps,"
[CM04] L. Chen, J. Malone-Lee, "Improved Identity-Based Signcryption," Cryptology ePrint Archive, Report 2004/114.
[CP01] C. Cocks, R. G. E. Pinch, "Identity-based cryptosystems based on the Weil pairing," unpublished manuscript, 2001. Cocks’ earlier paper is using quadratic residues and modular arithmetic, but has serious bandwidth expansion problem.
[CPB03] M. Casassa Mont, S. Pearson, P. Bramhall, "Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services," Hewlett-Packard Laboratories, technical report HPL-2003-49, 2003.
[CU02] Q. Cheng,
S. Uchiyama, "Nonuniform polynomial time algorithm to solve decisional
Diffie-Hellman problem in finite fields under conjecture,"
[CVC04] Z. Cheng, L. Vasiu, R. Comley, "Pairing-Based One-Round Tripartite Key Agreement Protocols," Cryptology ePrint Archive, Report 2004/079.
[CYHC04] S. S. M.
Chow, S. M. Yiu, L. C. K. Hui, K. P. Chow, "Efficient Forward and Provably
Secure ID-Based Signcryption Scheme with Public Verifiability and Public
Ciphertext Authenticity," 2971,
Springer-Verlag (2004), pp. 352-369.
[CZK03a] X. Chen,
F. Zhang, K. Kim, "A New ID-based Group Signature Scheme from Bilinear
Pairings,"
[CZK03b] X. Chen,
F. Zhang, K. Kim, "ID-based Multi-Proxy Signature and Blind
Multi-signature from Bilinear Pairings,"
[CZK04a] X. Chen,
F. Zhang, K. Kim, "Limited Verifier Signature from Bilinear
Pairings,"
[CZK04b] X. Chen, F. Zhang, K. Kim, "Chameleon Hashing without Key Exposure," Cryptology ePrint Archive, Report 2004/038.
[D02] Y. Dodis,
"Efficient Construction of (Distributed) Verifiable Random
Functions,"
[DBS04] R. Dutta, R. Barua, P. Sarkar, "Pairing-Based Cryptography : A Survey," Cryptology ePrint Archive, Report 2004/064.
[DE02] R. Dupont,
A. Enge, "Practical Non-Interactive Key Distribution Based on Pairings,"
[DEM02] R. Dupont, A. Enge, F. Morain, "Building curves with arbitrary small MOV degree over finite prime fields," Cryptology ePrint Archive, Report 2002/094.
[DFKMY03] Y.
Dodis, M. Franklin, J. Katz, A. Miyaji, M. Yung, "Intrusion-Resilient
Public-Key Encryption,"
[DL03] I. M.
Duursma, H.-S. Lee, "Tate Pairing Implementation for Hyperelliptic Curves x + d," Advances in Cryptology -
Asiacrypt'2003, LNCS
2894, Springer-Verlag (2003), pp. 111-123. See also Cryptology ePrint
Archive, Report 2003/053.
[DS98] I. M.
Duursma, K. Sakurai, "Efficient Algorithms for the Jacobian Variety of
Hyperelliptic Curves x + 1
Over a Finite Field of Odd Characteristic p," International
Conference on Coding Theory, Cryptography and Related Areas (ICCC),
Guanajuato, April 1998, Springer-Verlag (2000), pp. 73-89.
[DWGW03a] X. Du, Y. Wang, J. Ge, Y. Wang, "Chameleon Signature from Bilinear Pairing," Cryptology ePrint Archive, Report 2003/238.
[DWGW03b] X. Du, Y. Wang, J. Ge, Y. Wang, "ID-based Authenticated Two Round Multi-Party Key Agreement," Cryptology ePrint Archive, Report 2003/247.
[DWGW03c] X. Du, Y. Wang, J. Ge, Y. Wang, "An Improved ID-based Authenticated Group Key Agreement Scheme," Cryptology ePrint Archive, Report 2003/260.
[EFS04] M.
Enzmann, M. Fischlin, M. Schneider, "A Privacy-Friendly Loyalty System
Based on Discrete Logarithms over Elliptic Curves,"
[ELM02] K.
Eisentraeger, K. Lauter, P. L. Montgomery, "Fast Elliptic Curve Arithmetic
and Improved Weil Pairing Evaluation,"
[ELM03] K.
Eisentraeger, K. Lauter, P. L. Montgomery, "Improved Weil and Tate
Pairings for Elliptic and Hyperelliptic Curves,"
[FR94] G. Frey, H.
Rück, "A remark concerning
[FMR99] G. Frey,
M. Müller, H. Rück, "The Tate Pairing and the Discrete Logarithm Applied
to Elliptic Curve Cryptosystems,"
[G02a] M. Gagné, "Applications of Bilinear Maps in Cryptography," Master Thesis, University of Waterloo, 2002.
[G03] M. Gagné,
"Identity-Based Encryption: a Survey," CryptoBytes
[G02b] S. D.
Galbraith, "Supersingular curves in cryptography,"
[GHPSV04] R.
Granger, A. Holt, D. Page, N. Smart, F. Vercauteren, "Function Field Sieve
in Characteristic Three,"
[GHS02a] S. D.
Galbraith, K. Harrison, D. Soldera, "Implementing the Tate pairing,"
[GMV04] D. Galindo, S. Martin, J. L. Villar, "Evaluating elliptic curve based KEMs in light of pairings," Cryptology ePrint Archive, Report 2004/084.
[GR04] S. D. Galbraith, V. Rotger, "Easy decision-Diffie-Hellman groups," Cryptology ePrint Archive, Report 2004/070.
[GHS02b] S. D.
Galbraith, H. J. Hopkins, I. E. Shparlinski, "Secure Bilinear
Diffie-Hellman Bits,"
[GPS04a] R. Granger, D. Page, M. Stam, "On Small Characteristic Algebraic Tori in Pairing-Based Cryptography," Cryptology ePrint Archive, Report 2004/132.
[GPS04b] R. Granger, D. Page, M. Stam, "Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three," Cryptology ePrint Archive, Report 2004/157.
[GS02] C. Gentry,
A. Silverberg, "Hierarchical ID-Based Cryptography,"
[H02a] F. Heß,
"Efficient Identity Based Signature Schemes Based on Pairings,"
[H02b] F. Heß, "A Note on the Tate Pairing of Curves over Finite Fields," 2002. Submitted preprint.
[H04a] J. Herranz,
"A formal proof of security of Zhang and Kim's ID-based ring signature
scheme,"
[H04b] F. Heß,
"On the security of the verifiably-encrypted signature scheme of Boneh,
Gentry, Lynn and Shacham,"
[HDP04] L. Hu, J.
Dong, D. Pei, "An Implementation of Cryptosystems based on Tate
Pairing,"
[HFW03] L. Hu, D.
G. Feng, T. H. Wen, "Fast multiplication on a family of Koblitz elliptic
curves,"
[HK04] S.-H. Heng,
K. Kurosawa, "
[HL02] J. Horwitz,
B. Lynn, "Towards Hierarchical Identity-Based Encryption,"
[HPS02] K.
Harrison, D. Page, N. P. Smart, "Software implementation of finite fields
of characteristic three,"
[HS03] J. Herranz, G. Sáez, "A provably secure ID-based ring signature scheme," Cryptology ePrint Archive, Report 2003/261.
[HWI03] F. Hu, C.-H. Wu, J. D. Irwin, "A New Forward Secure Signature Scheme using Bilinear Maps," Cryptology ePrint Archive, Report 2003/188.
[HYW03] S. Han, K.
Y. Yueng, J. Wang, "Undeniable Signatures from Pairings over Elliptic
Curves,"
[IT02] T. Izu, T. Takagi,
"Efficient Computations of the Tate Pairing for the Large MOV
degrees," 2587,
Springer-Verlag (2003), pp. 283-297.
[J00] A. Joux,
"A one-round protocol for tripartite Diffie-Hellman,"
[J02] A. Joux,
"The Weil and Tate Pairings as Building Blocks for Public Key
Cryptosystems,"
[JN01] A. Joux, K. Nguyen, "Separating Decision Diffie-Hellman from Diffie-Hellman in Cryptographic Groups," Cryptology ePrint Archive, Report 2001/003.
[KH04] K.
Kurosawa, S.-H. Heng, "From Digital Signature to ID-Based Identification/Signature,"
[KKA03] A.
Khalili, J. Katz, W. A. Arbaugh, "Toward Secure Key Distribution in Truly
Ad-Hoc Networks,"
[KKK02] M. Kim, H.
Kim, K. Kim, "A New Identification Scheme based on the Gap Diffie-Hellman
Problem,"
[KLY03] H. S. Kim,
S. W. Lee, K. Y. Yoo, "ID-Based Password Authentication Scheme using
Smartcards and Fingerprints,"
[L02] B. Lynn, "Authenticated Identity-Based Encryption," Cryptology ePrint Archive, Report 2002/072.
[L03] B. Lynn,
"Applications of bilinear maps,"
[L04] S. Lee, "Threshold Password-Authenticated Key Retrieval Protocol Using Bilinear Pairings," Master Thesis, School of Engineering, Information and Communications University, Daejeon, Korea, 2004.
[LBDKYY04] B. Lee,
C. Boyd, E. Dawson, K. Kim, J. Yang, S. Yoo, "Secure Key Issuing in
ID-based Cryptography,"
[LHKKI04] S. Lee,
K. Han, S. Kang, K. Kim, S. R. Ine, "Threshold Password-Based
Authentication Using Bilinear Pairings,"
[LKKR03] S. Lee,
Y. Kim, K. Kim, D.-H. Ryu, "An Efficient Tree-based Group Key Agreement
using Bilinear map,"
[LLL02] H.-K. Lee, H.-S. Lee, Y.-R. Lee, "Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms," Cryptology ePrint Archive, Report 2002/166.
[LQ03a] B. Libert,
J.-J. Quisquater, "New identity based signcryption schemes based on
pairings,"
[LQ03b] B. Libert,
J.-J. Quisquater, "Efficient revocation and threshold pairing based
cryptosystems,"
[LQ03c] B. Libert, J.-J. Quisquater, "Identity Based Undeniable Signatures," Cryptology ePrint Archive, Report 2003/206.
[LQ04a] B. Libert,
J.-J. Quisquater, "Efficient Signcryption with Key Privacy from
Gap-Diffie-Hellman Groups,"
[LQ04b] B. Libert, J.-J. Quisquater, "The Exact Security of an Identity Based Signature and its Applications," Cryptology ePrint Archive, Report 2004/102.
[LW03] C.-Y. Lin, T.-C. Wu, "An identity-based ring signature scheme from bilinear pairings," Cryptology ePrint Archive, Report 2003/117.
[LWZ03a] C.-Y. Lin, T.-C. Wu, F. Zhang, "A Structured Multisignature Scheme from the Gap Diffie-Hellman Group," Cryptology ePrint Archive, Report 2003/090.
[LWZ03b] C.-Y.
Lin, T.-C. Wu, F. Zhang, "Proxy Signature and Proxy Multi-Signature from
Bilinear Pairings,"
[LWZH04] C.-Y.
Lin, T.-C. Wu, F. Zhang, J.-J-Hwang, "New Identity-based Society Oriented
Signature Schemes from Pairings on Elliptic Curves,"
[LZC03] S. Liu, F.
Zhang, K. Chen, "ID-Based Tripartite Key Agreement Protocol with
Pairings,"
[LZC04] S. Liu, F.
Zhang, K. Chen, "Authenticating Tripartite Key Agreement Protocol with
Pairings,"
[M02] J. Malone-Lee, "Identity-Based Signcryption," Cryptology ePrint Archive, Report 2002/098.
[M04a] M. Maas, "Pairing-Based Cryptography," Master Thesis, Technische Universiteit Eindhoven, 2004.
[M04b] W. Mao, "An Identity-based Non-interactive Authentication Framework for Computational Grids," Hewlett-Packard Laboratories, technical report HPL-2004-096, 2004.
[MB04a] N. McCullagh, P. S. L. M. Barreto, "Efficient and Forward-Secure Identity-Based Signcryption," Cryptology ePrint Archive, Report 2004/117.
[MB04b] N. McCullagh, P. S. L. M. Barreto, "A New Two-Party Identity-Based Authenticated Key Agreement," Cryptology ePrint Archive, Report 2004/122.
[MH03] W. Mao, K. Harrison, "Divisors, Bilinear Pairings and Pairing Enabled Cryptographic Applications," slide presentation.
[MNT01] A. Miyaji,
M. Nakabayashi, S. Takano, "New Explicit Conditions of Elliptic Curve
Traces for FR-Reduction,"
[MNT04] E. Mykletun, M. Narasimha, G. Tsudik, "Signature Bouquets: Immutability for Aggregated/Condensed Signatures," Cryptology ePrint Archive, Report 2004/091.
[MOV93] A.
Menezes, T. Okamoto, S. Vanstone, "Reducing elliptic curve logarithms to
logarithms in a finite field,"
[MP04] W. Mao, K. G. Paterson, "On the plausible deniability feature of Internet protocols," preprint, 2004.
[MSK02] S.
Mitsunari, R. Sakai, M. Kasahara, "A New Traitor Tracing,"
[MSL03] Y. Mu, W.
Susilo, Y.-X. Lin, "Identity-Based Broadcasting,"
[N03] D. Nalla, "ID-based tripartite key agreement with signatures," Cryptology ePrint Archive, Report 2003/144.
[N04] L. Nguyen, "A Trapdoor-free and Efficient Group Signature Scheme from Bilinear Pairings," Cryptology ePrint Archive, Report 2004/104.
[NR02] D. Nalla,
K. C. Reddy, "Identity Based Authenticated Group Key Agreement
Protocol,"
[NR03a] D. Nalla, K. C. Reddy, "ID-based tripartite Authenticated Key Agreement Protocols from pairings," Cryptology ePrint Archive, Report 2003/004.
[NR03b] D. Nalla, K. C. Reddy, "Signcryption scheme for Identity-based Cryptosystems," Cryptology ePrint Archive, Report 2003/066.
[OP01] T. Okamoto,
D. Pointcheval, "The Gap-Problems: a New Class of Problems for the
Security of Cryptographic Schemes,"
[P02a] K. G.
Paterson, "ID-based signatures from pairings on elliptic curves,"
[P02b] K. G.
Paterson, "Cryptography from pairings: a snapshot of current
research,"
[PS02] D. Page, N.
P. Smart, "Hardware implementation of finite fields of characteristic
three,"
[PSV04] D. Page, N. P. Smart, F. Vercauteren, "A comparison of MNT curves and supersingular curves," Cryptology ePrint Archive, Report 2004/165.
[RS02] K. Rubin,
A. Silverberg, "Supersingular abelian varieties in cryptology,"
[RS04] K. Rubin, A. Silverberg, "Using primitive subgroups to do more with fewer bits," Cryptology ePrint Archive, Report 2004/087.
[S98] J. H. Silverman, "Elliptic curve discrete
logarithms and the index calculus,"
[S01] N. P. Smart, "An Identity Based
Authenticated Key Agreement Protocol Based on the Weil Pairing,"
[S02a] M. Scott, "Authenticated ID-based Key Exchange and remote log-in with insecure token and PIN number," Cryptology ePrint Archive, Report 2002/164.
[S02c] N. P.
Smart, "Access control using pairing based cryptography,"
[S03a] K. Shim,
"Efficient one-round tripartite authenticated key agreement protocol from
the Weil pairing,"
[S03b] K. Shim,
"Efficient ID-based authenticated key agreement protocol from the Weil
pairing,"
[S03c] K. Shim, "A Man-in-the-middle attack on Nalla-Reddy's ID-based Tripartite Authenticated Key Agreement Protocol," Cryptology ePrint Archive, Report 2003/115.
[S03d] K. Shim, "Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols," Cryptology ePrint Archive, Report 2003/122.
[S03e] J. A.
Solinas, "ID-based Digital Signature Algorithms,"
[S04] M. Scott, "Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints," Cryptology ePrint Archive, Report 2004/017.
[SB04a] M. Scott,
P. S. L. M. Barreto, "Compressed Pairings,"
[SB04b] M. Scott, P. S. L. M. Barreto, "Generating more MNT elliptic curves," Cryptology ePrint Archive, Report 2004/058.
[SBWP03] R.
Steinfeld, L. Bull, H. Wang, J. Pieprzyk, "Universal Designated-Verifier
Signatures,"
[SD03] D. K.
Smetters, G. Durfee, "Domain-Based Administration of Identity-Based
Cryptosystems for Secure Email and IPSEC," 12
[SK03] R. Sakai, M. Kasahara, "ID based Cryptosystems with Pairing on Elliptic Curve," Cryptology ePrint Archive, Report 2003/054.
[SH03] H.-M. Sun, B.-T. Hsieh, "Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings," Cryptology ePrint Archive, Report 2003/113.
[SOK00] R. Sakai,
K. Ohgishi, M. Kasahara, "Cryptosystems based on pairing,"
[SU01] T. Saito,
S. Uchiyama, "A Remark on the MOV Algorithm for Non-supersingular Elliptic
Curves,"
[SZM04] W. Susilo,
F. Zhang, Y. Mu, "Identity-based Strong Designated Verifier Signature
Schemes,"
[TSZ03] V. D. Tô,
R. Safavi-Naini & F. Zhang, "New Traitor Tracing Schemes Using
Bilinear Map",
[TYW04] R.
Tamassia, D. Yao, and W. H. Winsborough, "Role-Based Cascaded
Delegation,"
[V01] E. Verheul,
"Self-blindable Credential Certificates from the Weil Pairing,"
[VZK03] D. L. Vo,
F. Zhang & K. Kim, "A New Threshold Blind Signature Scheme from
Pairings,"
[W04a] B. R. Waters, "Efficient Identity-Based Encryption Without Random Oracles," Cryptology ePrint Archive, Report 2004/180.
[W04b] V. K. Wei, "A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups," Cryptology ePrint Archive, Report 2004/039.
[XZCK03] Y. Xie,
F. Zhang, X. Chen & K. Kim, "ID-based Distributed `Magic Ink'
Signature from Pairings,"
[Y02] Y. Yacobi, "A Note on the Bilinear Diffie-Hellman Assumption," Cryptology ePrint Archive, Report 2002/113.
[Y03a] X. Yi,
"Efficient ID-based key agreement from the Weil pairing,"
[Y03b] X. Yi,
"An identity-based signature scheme from the Weil pairing,"
[YL03] D. Yao, A. Lysyanskaya, "Forward-Secure Hierarchical ID-Based Cryptography," Cryptology ePrint Archive, Report 2003/149.
[YW04] T. H. Yuen & V. K. Wei, "Fast and Proven Secure Blind Identity-Based Signcryption from Pairings," Cryptology ePrint Archive, Report 2004/121.
[ZC03] F. Zhang & X. Chen, "Attack on Two ID-based Authenticated Group Key Agreement Schemes," Cryptology ePrint Archive, Report 2003/259.
[ZC04] F. Zhang
& X. Chen, "Attack on an ID-based Authenticated Group Key Agreement
Scheme from PKC'2004,"
[ZK02a] F. Zhang
& K. Kim, "ID-based blind signature and ring signature from
pairings,"
[ZK02b] F. Zhang & K. Kim, "Signature-Masked Authentication Using the Bilinear Pairings," Cryptology & Information Security Laboratory (CAIS), Information and Communications University, technical report, 2002.
[ZK03] F. Zhang
& K. Kim, "Efficient ID-Based Blind Signature and Proxy Signature from
Bilinear Pairings," 2727,
Springer-Verlag (2003), pp. 312-323.
[ZLK02] F. Zhang, S. Liu & K. Kim, "ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings," Cryptology ePrint Archive, Report 2002/122.
[ZSL03] F. Zhang, R. Safavi-Naini & C.-Y. Lin, "New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing," Cryptology ePrint Archive, Report 2003/104.
[ZSS03a] F. Zhang, R. Safavi-Naini & W. Susilo, "Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03," Cryptology ePrint Archive, Report 2003/129.
[ZSS03b] F. Zhang, R. Safavi-Naini & W. Susilo, "ID-Based Chameleon Hashes from Bilinear Pairings," Cryptology ePrint Archive, Report 2003/208.
[ZSS04a] F. Zhang,
R. Safavi-Naini & W. Susilo, "Efficient Verifiably Encrypted Signature
and Partially Blind Signature from Bilinear Pairings,"
[ZSS04b] F. Zhang,
R. Safavi-Naini & W. Susilo, "An Efficient Signature Scheme from
Bilinear Pairings and Its Applications,"
[ZXF03] Z.-F. Zhang, J. Xu & D.-G. Feng, "Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem," Cryptology ePrint Archive, Report 2003/153. |

ECC >