-
1
-
-
84983104598
-
On defining proof of knowledge
-
Crypto '92, Springer-Verlag
-
M. Bellare and O. Goldreich, On Defining Proof of Knowledge, In Crypto '92, LNCS 740, pp. 390-420, Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
2
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM-CCS, pp, 62-73, 1993.
-
(1993)
ACM-CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84937408891
-
GQ and schnorr identification schemes: Proofs of security against impersonation under active and Concurrent Attacks
-
Crypto '02, Springer-Verlag
-
M. Bellare and A. Palacio, GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks, In Crypto '02, LNCS 2442, pp. 162-177, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Crypto '01, Springer-Verlag
-
D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, In Crypto '01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84946840347
-
Short signatures from the weil pairing
-
Asiacrypt '01, Springer-Verlag
-
D. Boneh, B. Lynn and H. Shacham, Short Signatures from the Weil Pairing, In Asiacrypt '01, LNCS 2248, pp. 566-582, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 566-582
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Eurocrypt '03, Springer-Verlag
-
D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, In Eurocrypt '03, LNCS 2656, pp. 416-432, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
35048848152
-
Short signatures without random oracles
-
Eurocrypt '04, Springer-Verlag
-
D. Boneh and X. Boyen, Short Signatures Without Random Oracles, In Eurocrypt '04, LNCS 3027, pp. 56-73, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
0000867507
-
Minimum disclosure proof of knowledge
-
G. Brassard, D. Chaum and C. Crpeau, Minimum Disclosure Proof of Knowledge, In Journal of Computer and System Sciences, 37 (2), pp. 156-189, 1988.
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crpeau, C.3
-
9
-
-
0010252194
-
Undeniable signatures
-
Crypto '89, Springer-Verlag
-
D. Chaum and H. Antwerpen, Undeniable Signatures, In Crypto '89, LNCS 435, pp. 212-216, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Antwerpen, H.2
-
10
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with anonymity revocation
-
Eurocrypt '01, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, An Efficient System for Non-Transferable Anonymous Credentials with Anonymity Revocation, In Eurocrypt '01, LNCS 2045, pp. 93-118, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Crypto '04, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps, In Crypto '04, LNCS 3152, pp. 56-72, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Crypto '87, Springer-Verlag
-
Y. Desmedt, C. Gourtier and S. Bengio, Special Uses and Abuses of the Fiat-Shamir Passport Protocol, In Crypto '87, LNCS 293, pp. 21-39, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Gourtier, C.2
Bengio, S.3
-
14
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen- message attack
-
S. Goldwasser, S. Micali and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen- Message Attack, In SIAM Journal on Computing, 17 (2), pp. 281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof system
-
S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof System, In SIAM Journal on Computing, 18 (1), pp. 186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
10444279474
-
Blackmailing using undeniable signatures
-
Eurocrypt "94, Springer-Verlag
-
M. Jakobsson, Blackmailing Using Undeniable Signatures, In Eurocrypt "94, LNCS 950, pp. 425-427, Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.950
, pp. 425-427
-
-
Jakobsson, M.1
-
17
-
-
0002914851
-
Designated verifier proofs and their applications
-
Eurocrypt '96, Springer-Verlag
-
M. Jakobsson, K. Sako and R. Impagliazzo, Designated Verifier Proofs and Their Applications, In Eurocrypt '96, LNCS 1070, pp. 143-154, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
18
-
-
84958550160
-
The weil and tate pairings as building blocks for public key cryptosysttms
-
Algorithmic Number Theory Symposium (ANTS-V) '02, Springer-Verlag
-
A. Joux: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosysttms, Algorithmic Number Theory Symposium (ANTS-V) '02, LNCS 2369, pp. 20-32, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
20
-
-
67651053584
-
Pseudonym systems
-
Selected Areas in Cryptography (SAC) '99, Springer-Verlag
-
A. Lysyanskaya, R. Rivest, A. Sahai and S. Wolf Pseudonym Systems, In Selected Areas in Cryptography (SAC) '99, LNCS 1758, pp. 184-199, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
21
-
-
79960836060
-
Deniable ring authentication
-
Crypto '02, Springer-Verlag
-
M. Naor, Deniable Ring Authentication, In Crypto '02, LNCS 2442, pp. 481-198, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 481-1198
-
-
Naor, M.1
-
22
-
-
24144448778
-
The security of the FDH variant of chaum's undeniable signature scheme
-
Public Key Cryptography (PKC) '05, Springer-Verlag
-
W. Ogata, K. Kurosawa and S. Heng, The Security of the FDH Variant of Chaum's Undeniable Signature Scheme, In Public Key Cryptography (PKC) '05, LNCS 3386, pp. 328-345, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 328-345
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.3
-
23
-
-
0000537828
-
Efficient identifications and signatures for smart cards
-
Crypto '89, Springer-Verlag
-
C. P. Schnorr, Efficient Identifications and Signatures for Smart Cards, In Crypto '89, LNCS 435, pp. 239-251, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
24
-
-
84946833891
-
How to leak a secret
-
Asiacrypt '01, Springer-Verlag
-
R. Rivest, A. Shamir and Y. Tauman, How to Leak a Secret, In Asiacrypt '01, LNCS 2248, pp. 552 - 565, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
25
-
-
0345058957
-
Universal designated-verifier signatures
-
Asiacrypt '03, Springer-Verlag
-
R. Steinfeld, L. Bull, H. Wang and J. Pieprzyk, Universal Designated-Verifier Signatures, In Asiacrypt '03, LNCS 2894, pp. 523-542, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
26
-
-
35048841170
-
Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures
-
Public Key Cryptography (PKC) '04, Springer-Verlag
-
R. Steinfeld, H. Wang and J. Pieprzyk, Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures, In Public Key Cryptography (PKC) '04, LNCS 2947, pp. 86-100, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
27
-
-
33646758450
-
Deniable ring authentication revisited
-
Applied Cryptography and Network Security (ACNS) '04, Springer-Verlag
-
W. Susilo and Y. Mu, Deniable Ring Authentication Revisited, In Applied Cryptography and Network Security (ACNS) '04, LNCS 3089, pp. 149-163, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3089
, pp. 149-163
-
-
Susilo, W.1
Mu, Y.2
-
28
-
-
26444589650
-
Short signature and universal designated verifier signature without random oracles
-
Applied Cryptography and Network Security (ACNS) '05, Springer-Verlag
-
R. Zhang, J. Furukawa and H. Imai, Short signature and Universal Designated Verifier Signature without Random Oracles, In Applied Cryptography and Network Security (ACNS) '05, LNCS 3531, pp. 483-498, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 483-498
-
-
Zhang, R.1
Furukawa, J.2
Imai, H.3
|