-
1
-
-
84921018856
-
A practical and provably secure group signature scheme
-
LNCS
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure group signature scheme. In CRYPTO 2000, LNCS, vol. 1880, pp. 255-270.
-
CRYPTO 2000
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
0345490609
-
Efficient group signatures without trapdoors
-
LNCS
-
G. Ateniese and B. de Medeiros. Efficient group signatures without trapdoors. In ASIACRYPT '03, LNCS, vol. 2894, pp. 246-268, 2003.
-
(2003)
ASIACRYPT '03
, vol.2894
, pp. 246-268
-
-
Ateniese, G.1
De Medeiros, B.2
-
4
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
LNCS
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT '03, LNCS vol. 2656, pp. 614-629.
-
EUROCRYPT '03
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
5
-
-
21144456245
-
Short group signatures using strong diffie hellman
-
LNCS. Springer Verlag
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures using strong diffie hellman. In CRYPTO 2004, LNCS. Springer Verlag, 2004.
-
(2004)
CRYPTO 2004
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
LNCS
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO '02, LNCS, vol. 2442.
-
CRYPTO '02
, vol.2442
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
35248839965
-
A signature scheme with efficient protocols
-
LNCS
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN '02, LNCS, vol. 2576, pp. 268-289, 2002.
-
(2002)
SCN '02
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
LNCS. Springer Verlag
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, LNCS. Springer Verlag, 2004.
-
(2004)
CRYPTO 2004
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
84947809553
-
A group signature scheme with improved efficiency
-
ASIACRYPT '98
-
J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In ASIACRYPT '98, vol. 1514 of LNCS, pp. 160-174, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 160-174
-
-
Camenisch, J.1
Michels, M.2
-
10
-
-
84958612917
-
Efficient group signature schemes for large groups
-
J. Camenisch and M. Stadier. Efficient group signature schemes for large groups. In CRYPTO '97, LNCS, vol. 1294, PP. 410-424, 1997.
-
(1997)
CRYPTO '97, LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadier, M.2
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, LNCS, vol. 263, pp. 186-194, 1986.
-
(1986)
CRYPTO '86, LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
17444362761
-
On the security of modular exponentiation with application to the construction of pseudorandom generators
-
O. Goldreich and V. Rosen. On the security of modular exponentiation with application to the construction of pseudorandom generators. Journal of Cryptology, 16(2):71-93, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.2
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
14
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. on Comp., 17(2):281-308, Apr. 1988.
-
(1988)
SIAM J. on Comp.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
15
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In proceedings of STOC '89, pp. 44-61, 1989.
-
(1989)
Proceedings of STOC '89
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
16
-
-
21144443064
-
Traceable signatures
-
A. Kiayias, Y. Tsiounis, and M. Yung. Traceable signatures. Cryptology ePrint Archive, Report 2004/007, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.7
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
17
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. K. Verheul. Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255-293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.K.2
-
18
-
-
84937425161
-
Unique signatures and verifiable random functions from the DHDDH separation
-
LNCS
-
A. Lysyanskaya. Unique signatures and verifiable random functions from the DHDDH separation. In CRYPTO 2002, LNCS, pp. 597-612, 2002.
-
(2002)
CRYPTO 2002
, pp. 597-612
-
-
Lysyanskaya, A.1
-
19
-
-
84927727752
-
Security proofs for signature schemes
-
EUROCRYPT '96. Springer Verlag
-
D. Pointcheval and J. Stern. Security proofs for signature schemes. In EUROCRYPT '96, vol. 1070 of LNCS, pp. 387-398. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
20
-
-
84888914811
-
-
Trusted Computing Group. TCG TPM specification 1.2. Available at www.trustedcomputinggroup.org, 2003.
-
TCG TPM Specification 1.2
-
-
-
21
-
-
0344628463
-
Accumulating composites and improved group signing
-
G. Tsudik and S. Xu. Accumulating composites and improved group signing. In proceedings of ASIACRYPT '03, LNCS series, volume 2894, PP. 269-286, 2003.
-
(2003)
Proceedings of ASIACRYPT '03, LNCS Series
, vol.2894
, pp. 269-286
-
-
Tsudik, G.1
Xu, S.2
|