Research notesAttacks on an ID-based signature scheme based on Rabin's public key cryptosystem
References (10)
Contemporary Cryptology
(1992)- et al.
A method for obtaining digital signatures and public-key cryptosystems
Commun. ACM
(1978) A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Trans. Infor. Theory
(1985)Identity based cryptosystems and signature schemes
- et al.
The knowledge complexity of interactive proof systems
SIAM J. Comput.
(1989)
There are more references available in the full text version of this article.
Cited by (0)
Copyright © 1994 Published by Elsevier B.V.