-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare, editor, CRYPTO 2000, Santa Barbara, CA, USA, Aug. 20-24, Springer-Verlag, Berlin, Germany
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, CRYPTO 2000, volume 1880 of LNCS, pages 255-270, Santa Barbara, CA, USA, Aug. 20-24, 2000. Springer-Verlag, Berlin, Germany.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
0032761602
-
Group signatures Á la carte
-
ACM, editor, Baltimore, Maryland, USA, Jan. 17-19, ACM-SIAM
-
G. Ateniese and G. Tsudik. Group signatures Á la carte. In ACM, editor, 10th SODA, pages 848-849, Baltimore, Maryland, USA, Jan. 17-19, 1999. ACM-SIAM.
-
(1999)
10th SODA
, pp. 848-849
-
-
Ateniese, G.1
Tsudik, G.2
-
3
-
-
84921023488
-
Some open issues and new directions in group signatures
-
M. Franklin, editor, FC'99, Anguilla, British West Indies, Feb. Springer-Verlag, Berlin, Germany
-
G. Ateniese and G. Tsudik. Some open issues and new directions in group signatures. In M. Franklin, editor, FC'99, volume 1648 of LNCS, pages 196-211, Anguilla, British West Indies, Feb. 1999. Springer-Verlag, Berlin, Germany.
-
(1999)
LNCS
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
4
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
IEEE, editor, Las Vegas, USA, Oct. 14-17, IEEE Computer Society Press
-
B. Barak. How to go beyond the black-box simulation barrier. In IEEE, editor, 42nd FOCS, pages 106-115, Las Vegas, USA, Oct. 14-17, 2001. IEEE Computer Society Press.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
5
-
-
0036949106
-
Constant-round coin-tossing with a man in the middle or realizing the shared random string model
-
IEEE, editor, Vancouver, Canada, Nov. 16-19, IEEE Computer Society Press
-
B. Barak. Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In IEEE, editor, 43nd FOCS, pages 345-355, Vancouver, Canada, Nov. 16-19, 2002. IEEE Computer Society Press.
-
(2002)
43nd FOCS
, pp. 345-355
-
-
Barak, B.1
-
6
-
-
0035163053
-
Resettably-sound zero-knowledge and its applications
-
IEEE, editor, Las Vegas, USA, Oct. 14-17, IEEE Computer Society Press
-
B. Barak, O. Goldreich, S. Goldwasser, and Y. Lindell. Resettably-sound zero-knowledge and its applications. In IEEE, editor, 42nd FOCS, pages 116-125, Las Vegas, USA, Oct. 14-17, 2001. IEEE Computer Society Press.
-
(2001)
42nd FOCS
, pp. 116-125
-
-
Barak, B.1
Goldreich, O.2
Goldwasser, S.3
Lindell, Y.4
-
7
-
-
84957657742
-
Many-to-one trapdoor functions and their ralation to public-key cryptosystems
-
H. Krawczyk, editor, CRYPTO'98, Santa Barbara, CA, USA, Aug. 23-27, Springer-Verlag, Berlin, Germany
-
M. Bellare, S. Halevi, A. Sahai, and S. P. Vadhan. Many-to-one trapdoor functions and their ralation to public-key cryptosystems. In H. Krawczyk, editor, CRYPTO'98, volume 1462 of LNCS, pages 283-298, Santa Barbara, CA, USA, Aug. 23-27, 1998. Springer-Verlag, Berlin, Germany.
-
(1998)
LNCS
, vol.1462
, pp. 283-298
-
-
Bellare, M.1
Halevi, S.2
Sahai, A.3
Vadhan, S.P.4
-
8
-
-
0026466320
-
How to sign given any trapdoor function
-
M. Bellare and S. Micali. How to sign given any trapdoor function. Journal of the ACM, 39(1):214-233, 1992.
-
(1992)
Journal of the ACM
, vol.39
, Issue.1
, pp. 214-233
-
-
Bellare, M.1
Micali, S.2
-
9
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
E. Biham, editor, EUROCRYPT 2003, Warsaw, Poland, May 4-8, Springer-Verlag, Berlin, Germany
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 614-629, Warsaw, Poland, May 4-8, 2003. Springer-Verlag, Berlin, Germany.
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
11
-
-
21144456245
-
Short group signatures
-
M. Franklin, editor, LNCS, Santa Barbara, CA, USA, Aug. 15-19, Springer-Verlag, Berlin, Germany
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. Franklin, editor, CRYPTO 2004, LNCS, Santa Barbara, CA, USA, Aug. 15-19, 2004. Springer-Verlag, Berlin, Germany.
-
(2004)
CRYPTO 2004
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
12
-
-
84937429196
-
Efficient revocation in group signatures
-
K. Kim, editor, PKC 2001, Cheju Island, South Korea, Feb. 13-15, Springer-Verlag, Berlin, Germany
-
E. Bresson and J. Stern. Efficient revocation in group signatures. In K. Kim, editor, PKC 2001, volume 1992 of LNCS, pages 190-206, Cheju Island, South Korea, Feb. 13-15, 2001. Springer-Verlag, Berlin, Germany.
-
(2001)
LNCS
, vol.1992
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
13
-
-
84957354154
-
Efficient and generalized group signatures
-
W. Fumy, editor, EUROCRYPT'97, Konstanz, Germany, May 11-15, Springer-Verlag, Berlin, Germany
-
J. Camenisch. Efficient and generalized group signatures. In W. Fumy, editor, EUROCRYPT'97, volume 1233 of LNCS, pages 465-479, Konstanz, Germany, May 11-15, 1997. Springer-Verlag, Berlin, Germany.
-
(1997)
LNCS
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
14
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor, EUROCRYPT'91, Brighton, UK, Apr. 8-11, Springer-Verlag, Berlin, Germany
-
D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, EUROCRYPT'91, volume 547 of LNCS, pages 257-265, Brighton, UK, Apr. 8-11, 1991. Springer-Verlag, Berlin, Germany.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
15
-
-
84948980067
-
New group signature schemes
-
A. D. Santis, editor, EUROCRYPT'94, Perugia, Italy, May 9-12, Springer-Verlag, Berlin, Germany
-
L. Chen and T. P. Pedersen. New group signature schemes. In A. D. Santis, editor, EUROCRYPT'94, volume 950 of LNCS, pages 171-181, Perugia, Italy, May 9-12, 1994. Springer-Verlag, Berlin, Germany.
-
(1994)
LNCS
, vol.950
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
17
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
IEEE, editor, Las Vegas, USA, Nov. 12-14, IEEE Computer Society Press
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan. The relationship between public key encryption and oblivious transfer. In IEEE, editor, 41st FOCS, pages 325-335, Las Vegas, USA, Nov. 12-14, 2000. IEEE Computer Society Press.
-
(2000)
41st FOCS
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
18
-
-
0035172306
-
On the impossibility of basing trapdoor functions on trapdoor predicates
-
IEEE, editor, Las Vegas, USA, Oct. 14-17, IEEE Computer Society Press
-
Y. Gertner, T. Malkin, and O. Reingold. On the impossibility of basing trapdoor functions on trapdoor predicates. In IEEE, editor, 42nd FOCS, pages 126-135, Las Vegas, USA, Oct. 14-17, 2001. IEEE Computer Society Press.
-
(2001)
42nd FOCS
, pp. 126-135
-
-
Gertner, Y.1
Malkin, T.2
Reingold, O.3
-
19
-
-
0022914590
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
IEEE, editor, IEEE Computer Society Press
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In IEEE, editor, 27th FOCS, pages 174-187. IEEE Computer Society Press, 1986.
-
(1986)
27th FOCS
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(3):691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, Apr. 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
24
-
-
0024770898
-
One-way functions are essential for complexity-based cryptography
-
IEEE, editor, IEEE Computer Society Press
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In IEEE, editor, 30th FOCS, pages 230-235. IEEE Computer Society Press, 1989.
-
(1989)
30th FOCS
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
25
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
ACM, editor, Seattle, Washington, USA, May 15-17, ACM Press
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In ACM, editor, 21st ACM STOC, pages 44-61, Seattle, Washington, USA, May 15-17, 1989. ACM Press.
-
(1989)
21st ACM STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
26
-
-
35248872023
-
Extracting group signatures from traitor tracing schemes
-
E. Biham, editor, EUROCRYPT 2003, Warsaw, Poland, May 4-8, Springer-Verlag, Berlin, Germany
-
A. Kiayias and M. Yung. Extracting group signatures from traitor tracing schemes. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 630-648, Warsaw, Poland, May 4-8, 2003. Springer-Verlag, Berlin, Germany.
-
(2003)
LNCS
, vol.2656
, pp. 630-648
-
-
Kiayias, A.1
Yung, M.2
-
28
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM, editor, Seattle, Washington, USA, May 15-17, ACM Press
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In ACM, editor, 21st ACM STOC, pages 33-43, Seattle, Washington, USA, May 15-17, 1989. ACM Press.
-
(1989)
21st ACM STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
29
-
-
35048815001
-
Notions of reducibility between cryptographic primitives
-
M. Naor, editor, TCC 2004, Cambridge, MA, USA, Feb. 19-21, Springer-Verlag, Berlin, Germany
-
O. Reingold, L. Trevisan, and S. P. Vadhan. Notions of reducibility between cryptographic primitives. In M. Naor, editor, TCC 2004, volume 2951 of LNCS, pages 1-20, Cambridge, MA, USA, Feb. 19-21, 2004. Springer-Verlag, Berlin, Germany.
-
(2004)
LNCS
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.P.3
-
30
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM, editor, Baltimore, Maryland, USA, May 14-16, ACM Press
-
J. Rompel. One-way functions are necessary and sufficient for secure signatures. In ACM, editor, 22nd ACM STOC, pages 387-394, Baltimore, Maryland, USA, May 14-16, 1990. ACM Press.
-
(1990)
22nd ACM STOC
, pp. 387-394
-
-
Rompel, J.1
-
31
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE, editor, IEEE Computer Society Press
-
A. C. Yao. Theory and applications of trapdoor functions. In IEEE, editor, 23rd FOCS, pages 80-91. IEEE Computer Society Press, 1982.
-
(1982)
23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
|