-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Proc. Advances in Cryptology, Crypto'00
-
G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Proc. Advances in Cryptology, Crypto'00, LNCS 1880, pp. 255-270, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84949210733
-
The power of RSA inversion oracles and the security of chaum's RSA-based blind signature scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko, The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme, Proc. Financial Cryptography, pp. 319-338, 2001.
-
(2001)
Proc. Financial Cryptography
, pp. 319-338
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
5
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Proc. Advances in Cryptology, Eurocrypt'01
-
J. Camenisch, A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Proc. Advances in Cryptology, Eurocrypt'01, LNCS 1880, pp. 93-118, 2001.
-
(2001)
LNCS
, vol.1880
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
35248839965
-
A signature scheme with efficient protocols
-
Proc. International Conference on Security in Communication Networks
-
J. Camenisch, A. Lysyanskaya, A Signature Scheme with Efficient Protocols, Proc. International Conference on Security in Communication Networks, LNCS 2576, pp. 268-289, 2002.
-
(2002)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
0001604533
-
Blind signatures for untraceable payments
-
Crypto'82
-
D. Chaum, Blind Signatures for Untraceable Payments, Proc. Advances in Cryptology, Crypto'82, pp. 199-203, 1982.
-
(1982)
Proc. Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without, identification: Transaction systems to make big brother obsolete
-
D. Chaum, Security Without, Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, 28(10), pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
85024290278
-
Group signatures
-
Proc. Advances in Cryptology, Eurocrypt'91
-
D, Chaum, E. van Heyst, Group Signatures, Proc. Advances in Cryptology, Eurocrypt'91, LNCS 547, pp. 257-205, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-1205
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
84947809553
-
A group signature scheme with improved efficiency
-
Proc. Advances in Cryptology, Asiacrypt'98
-
J. Camenisch, M. Michels, A Group Signature Scheme with Improved Efficiency, Proc. Advances in Cryptology, Asiacrypt'98, LNCS 1514, pp. 160-174, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 160-174
-
-
Camenisch, J.1
Michels, M.2
-
11
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Proc. Advances in Cryptology, Eurocrypt'99
-
J. Camenisch, M. Michels, Proving in Zero-knowledge that A Number is the Product of Two Safe Primes, Proc. Advances in Cryptology, Eurocrypt'99, LNCS 1592, pp. 107-122, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
12
-
-
84958612917
-
Efficient, group signature schemes for large groups
-
Proc. Advances in Cryptology, Crypto'97
-
J. Camenisch, M. Stadler, Efficient, Group Signature Schemes for Large Groups, Proc. Advances in Cryptology, Crypto'97, LNCS 1296, pp.410-424, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
4243288255
-
An integer commitment scheme based on groups with hidden order
-
I. Damagard, E. Fujisaki, An Integer Commitment Scheme Based on Groups with Hidden Order, IACR Cryptology ePrint Archive 2001/064, 2001.
-
(2001)
IACR Cryptology EPrint Archive
, vol.2001
, Issue.64
-
-
Damagard, I.1
Fujisaki, E.2
-
14
-
-
67651053584
-
Pseudonym systems
-
Proc. Selected Areas in Cryptography
-
A. Lysyanskaya, R. Rivest, A. Sahai, S. Wolf, Pseudonym Systems, Proc. Selected Areas in Cryptography, LNCS 1758, 1999.
-
(1999)
LNCS
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
15
-
-
33646000942
-
An anonymous loan system based on group signature scheme
-
Proc. Information Security Conference, ISC'02
-
R. Shigetomi, A. Otsuka, T. Ogawa, H, Imai, An Anonymous Loan System Based on Group Signature Scheme, Proc. Information Security Conference, ISC'02, LNCS 2433, pp. 244-256, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 244-256
-
-
Shigetomi, R.1
Otsuka, A.2
Ogawa, T.3
Imai, H.4
-
16
-
-
84957629646
-
Fair blind signatures
-
Proc. Advances in Cryptology, Eurocrypt'95
-
M. Stadler, J. M Piveteau, J. Camenisch, Fair Blind Signatures, Proc. Advances in Cryptology, Eurocrypt'95, LNCS 921, pp. 209-219, 1995.
-
(1995)
LNCS
, vol.921
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.M.2
Camenisch, J.3
-
17
-
-
0005072366
-
Unlinkable serial transactions: Protocols and applications
-
.1.7. S. G. Stubblebine, P. F. Syverson, D. M. Goldschlag, Unlinkable Serial Transactions: Protocols and Applications, ACM Transactions on Information and System Security, 2(4), pp. 354-389, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 354-389
-
-
Stubblebine, S.G.1
Syverson, P.F.2
Goldschlag, D.M.3
|