Skip to main content
placeholder image

How to construct identity-based signatures without the key escrow problem

Journal Article


Abstract


UOW Authors


  •   Yuen, Tsz Hon (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)

Publication Date


  • 2010

Citation


  • Yuen, T. Hon., Susilo, W. & Mu, Y. (2010). How to construct identity-based signatures without the key escrow problem. International Journal of Information Security, 9 (4), 297-311.

Scopus Eid


  • 2-s2.0-77955090387

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3437

Number Of Pages


  • 14

Start Page


  • 297

End Page


  • 311

Volume


  • 9

Issue


  • 4

Abstract


UOW Authors


  •   Yuen, Tsz Hon (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)

Publication Date


  • 2010

Citation


  • Yuen, T. Hon., Susilo, W. & Mu, Y. (2010). How to construct identity-based signatures without the key escrow problem. International Journal of Information Security, 9 (4), 297-311.

Scopus Eid


  • 2-s2.0-77955090387

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3437

Number Of Pages


  • 14

Start Page


  • 297

End Page


  • 311

Volume


  • 9

Issue


  • 4