-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO'2000, pages 255-270.
-
CRYPTO'2000
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
0001451923
-
Some open issues and new directions in group signatures
-
G. Ateniese and G. Tsudik. Some open issues and new directions in group signatures. In Financial Crypto'99).
-
Financial Crypto'99
-
-
Ateniese, G.1
Tsudik, G.2
-
4
-
-
2642534257
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EuroCrypto'2003.
-
EuroCrypto'2003
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
5
-
-
35048825135
-
Receipt-free secret-ballot election (extended abstract)
-
J. Benaloh and D. Tuinstra. Receipt-free secret-ballot election (extended abstract). In STOC, 1994.
-
(1994)
STOC
-
-
Benaloh, J.1
Tuinstra, D.2
-
9
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO'2002, pages 61-76.
-
CRYPTO'2002
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EuroCrypto'2001, pages 93-118.
-
EuroCrypto'2001
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
84880895254
-
An identity escrow scheme with appointed verifiers
-
J. Camenisch and A. Lysyanskaya. An identity escrow scheme with appointed verifiers. In CRYPTO'2001, pages 388-407.
-
CRYPTO'2001
, pp. 388-407
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
84958612917
-
Efficient group signature schemes for large groups (extended abstract)
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO'97, pages 410-424.
-
CRYPTO'97
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
14
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
J. Camenisch and E. van Herreweghen. Design and implementation of the idemix anonymous credential system. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
16
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct.
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10): 1030-1044, Oct. 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
17
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
D. Chaum and J. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In CRYPTO '86, pages 118-167.
-
CRYPTO '86
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.2
-
23
-
-
0022045868
-
Impossibility of distributed commit with one faulty process
-
M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed commit with one faulty process. Journal of the ACM, 32(2), 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
-
-
Fischer, M.1
Lynch, N.2
Paterson, M.3
-
27
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2), 1998.
-
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 1998
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
28
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In EuroCrypto'2000, pages 539-556.
-
EuroCrypto'2000
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
31
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In STOC, 1990.
-
(1990)
STOC
-
-
Naor, M.1
Yung, M.2
-
32
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO'91, pages 433-444.
-
CRYPTO'91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
33
-
-
0035750987
-
Practical forward-secure group signature schemes
-
D. Song. Practical forward-secure group signature schemes. In ACM CCS, 2001.
-
(2001)
ACM CCS
-
-
Song, D.1
|