Unconditionally Secure Group Signatures
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-08-01
著者
-
SEITO Takenobu
Graduate School of Environment and Information Sciences, Yokohama National University
-
HARA Yuki
Graduate School of Environment and Information Sciences, Yokohama National University
-
SHIKATA Junji
Graduate School of Environment and Information Sciences, Yokohama National University
-
MATSUMOTO Tsutomu
Graduate School of Environment and Information Sciences, Yokohama National University
-
Hara Yuki
Graduate School Of Environment And Information Sciences Yokohama National University
-
Seito Takenobu
Graduate School Of Environment And Information Sciences Yokohama National University
-
Shikata Junji
Graduate School Of Environment And Information Sciences Yokohama National University
-
Shikata Junji
Yokohama National Univ. Yokohama‐shi Jpn
-
Matsumoto Tsutomu
Graduate School Of Engineering Yokohama National University:graduate School Of Environment And Infor
-
Matsumoto Tsutomu
Graduate School Of Environmental And Information Sciences Yokohama National University
関連論文
- Unconditionally Secure Group Signatures
- How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
- Unconditionally Secure Group Signatures
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- Interaction Key Generation Schemes (Protocol) (Cryptography and Information Security)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- A Distributed User Revocation Scheme for Ad-Hoc Networks(Advances in Ad Hoc Mobile Communications and Networking)
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
- A Design Methodology for a DPA-Resistant Circuit with RSL Techniques
- How to Decide Selection Functions for Power Analysis : From the Viewpoint of Hardware Architecture of Block Ciphers
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Constructing c-Secure CRT Codes Using Polynomials over Finite Fields(Information Security)
- Detection-Resistant Steganography for Standard MIDI Files (Information Security)
- An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability(Special Section on Cryptography and Information Security)
- An Artifact-metric System Which Utilizes Inherent Texture (特集 21世紀のコンピュータセキュリティ技術)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- A Flexible Tree-Based Key Management Framework(Special Section on Cryptography and Information Security)
- Information-Flow-Based Access Control for Web Browsers
- Multiparty DSA Signature Generation without Simultaneous User Operations(Application Information Security)
- Random-Error Resilience of a Short Collusion-Secure Code
- An Evaluation Method for a Magnetic Artifact-metric System (特集 電子社会に向けたコンピュータセキュリティ技術)
- A Scheme of Secret Communication Using Internet Control Message Protocol(Special Section on Cryptography and Information Security)
- On Applicability of Differential Cryptanalysis, Linear Cryptanalysis and Mod n Cryptanalysis to an Encryption Algorithm M8(ISO9979-20) (特集 21世紀のコンピュータセキュリティ技術)
- A proper security analysis method for CMOS cryptographic circuits
- Finding Malicious Authoritative DNS Servers