-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Springer-Verlag New York, NY (Vol. 1880 of Lecture Notes in Computer Science).
-
Ateniense, G., Camenish, J., Joye, M. and Tsudik, G. (2000), “A practical and provably secure coalition-resistant group signature scheme”, CRYPTO 2000: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 255-70 (Vol. 1880 of Lecture Notes in Computer Science).
-
(2000)
CRYPTO 2000: Advances in Cryptology
, pp. 255-270
-
-
Ateniense, G.1
Camenish, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
35048903552
-
A first approach to provide anonymity in attribute certificates
-
Springer-Verlag New York, NY (Vol. 2947 of Lecture Notes in Computer Science).
-
Benjumea, V., Löpez, J., Montenegro, J.A. and Troya, J.M. (2004), “A first approach to provide anonymity in attribute certificates”, in Ed. Bao, F., Ed. Deng, R.H. and Ed. Zhou, J. (Eds), PKC 2004, International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, New York, NY, pp. 402-15 (Vol. 2947 of Lecture Notes in Computer Science).
-
(2004)
PKC 2004, International Workshop on Practice and Theory in Public Key Cryptography
, pp. 402-415
-
-
Benjumea, V.1
Löpez, J.2
Montenegro, J.A.3
Troya, J.M.4
Bao, F.5
Deng, R.H.6
Zhou, J.7
-
3
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum Press Santa Barbara, CA
-
Chaum, D. (1983), “Blind signatures for untraceable payments”, in Ed. Chaum, D., Ed. Rivest, R. and Ed. Sherman, A. (Eds), Advances in Cryptology–Crypto'82, Plenum Press, Santa Barbara, CA, pp. 199-203.
-
(1983)
Advances in Cryptology–Crypto'82
, pp. 199-203
-
-
Chaum, D.1
Chaum, D.2
Rivest, R.3
Sherman, A.4
-
4
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Chaum, D. (1985), “Security without identification: transaction systems to make big brother obsolete”, Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
85024290278
-
Group signatures
-
Springer-Verlag Berlin (Volume 547 of Lecture Notes in Computer Science).
-
Chaum, D. and van Heyst, E. (1991), “Group signatures”, in Ed. Davies, D.W. (Ed.), Advances in Cryptology – EuroCrypt '91, Springer-Verlag, Berlin, pp. 257-65 (Volume 547 of Lecture Notes in Computer Science).
-
(1991)
Advances in Cryptology – EuroCrypt '91
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
Davies, D.W.3
-
8
-
-
35048841283
-
Traceable signatures
-
Springer-Verlag New York, NY (Vol. 3027 of Lecture Notes in Computer Science).
-
Kiayias, A., Tsiounis, Y. and Yung, M. (2004a), “Traceable signatures”, EUROCRYPT 2004: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 571-89 (Vol. 3027 of Lecture Notes in Computer Science).
-
(2004)
EUROCRYPT 2004: Advances in Cryptology
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
9
-
-
84957649548
-
Identity escrow
-
Springer-Verlag New York, NY (Vol. 1462 of Lecture Notes in Computer Science).
-
Kilian, J. and Petrank, E. (1998), “Identity escrow”, CRYPTO 1998: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 169-85 (Vol. 1462 of Lecture Notes in Computer Science).
-
(1998)
CRYPTO 1998: Advances in Cryptology
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
10
-
-
35048876720
-
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings
-
Springer-Verlag New York, NY (Vol. 3329 of Lecture Notes in Computer Science).
-
Nguyen, L. and Safavi-Naini, R. (2004), “Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings”, ASIACRYPT 2004: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 372-86 (Vol. 3329 of Lecture Notes in Computer Science).
-
(2004)
ASIACRYPT 2004: Advances in Cryptology
, pp. 372-386
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
11
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag New York, NY (Vol. 2248 of Lecture Notes in Computer Science).
-
Rivest, R., Shamir, A. and Tauman, Y. (2001), “How to leak a secret”, ASIACRYPT 2001: Advances in Cryptology, Springer-Verlag, New York, NY, pp. 552-65 (Vol. 2248 of Lecture Notes in Computer Science).
-
(2001)
ASIACRYPT 2001: Advances in Cryptology
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
12
-
-
84957629646
-
Fair blind signatures
-
Springer-Verlag New York, NY (Vol. 921 of Lecture Notes in Computer Science).
-
Stadler, M.A., Piveteau, J.M. and Camenisch, J.L. (1995), “Fair blind signatures”, in Ed. Guillou, L.C. and Ed. Quisquater, J.J. (Eds), Advances in Cryptology–Eurocrypt'95, Springer-Verlag, New York, NY, pp. 209-19 (Vol. 921 of Lecture Notes in Computer Science).
-
(1995)
Advances in Cryptology–Eurocrypt'95
, pp. 209-219
-
-
Stadler, M.A.1
Piveteau, J.M.2
Camenisch, J.L.3
Guillou, L.C.4
Quisquater, J.J.5
-
13
-
-
50749133265
-
On blind signatures and perfect crimes
-
von Solms, S. and Naccache, D. (1992), “On blind signatures and perfect crimes”, Computers & Security, Vol. 11, pp. 581-3.
-
(1992)
Computers & Security
, vol.11
, pp. 581-583
-
-
von Solms, S.1
Naccache, D.2
-
14
-
-
21144443064
-
-
Report 2004/007, available at: http://eprint.iacr.org/
-
Kiayias, A., Tsiounis, Y. and Yung, M. (2004b), Traceable Signatures, IACR E-Print Cryptology Archive, Report 2004/007, available at: http://eprint.iacr.org/
-
(2004)
Traceable Signatures, IACR E-Print Cryptology Archive
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
|