Cryptology ePrint Archive: Report 2004/327

Available versions in chronological order


Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui
Publication Info: In Angelos Keromytis and Moti Yung, editors, Applied Cryptography and Network Security, 3rd International Conference, ACNS 2005, New York, USA, June 7-10, 2005. Volume 3531 of Lecture Notes in Computer Science.


[ Cryptology ePrint archive ]