-
1
-
-
0346685895
-
Combining encryption and proof of knowledge in the random oracle model
-
Masayuki Abe. Combining Encryption and Proof of Knowledge in the Random Oracle Model. The Computer Journal, 47(1):58-70, 2004.
-
(2004)
The Computer Journal
, vol.47
, Issue.1
, pp. 58-70
-
-
Abe, M.1
-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Advances in Cryptology - Crypto 2000, Springer-Verlag
-
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Advances in Cryptology - Crypto 2000, Volume 1880 of Lecture Notes in Computer Science. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
35048848152
-
Short signatures without random oracles
-
Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
-
Dan Boneh and Xavier Boyen. Short Signatures Without Random Oracles. Advances in Cryptology - Eurocrypt 2004, Volume 3027 of Lecture Notes in Computer Science, pages 56-73. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
35048832490
-
An un-instantiable random-oracle-model scheme for a hybrid-encryption problem
-
Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
-
Mihir Bellare, Alexandra Boldyreva, and Adriana Palacio. An Un-Instantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. Advances in Cryptology - Eurocrypt 2004, Volume 3027 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
5
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology - Crypto 2004, Springer-Verlag
-
Dan Boneh, Xavier Boyen, and Hovav Shacham. Short Group Signatures. Advances in Cryptology - Crypto 2004, Volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Advances in Cryptology - Eurocrypt'98, Springer-Verlag
-
Mihir Bellare, Juan Garay, and Tal Rabin. Fast Batch Verification for Modular Exponentiation and Digital Signatures. Advances in Cryptology - Eurocrypt'98, Volume 1403 of Lecture Notes in Computer Science, pages 236-250. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
7
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
-
Mihir Bellare, Daniele Micciancio, and Bogdan Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Advances in Cryptology - Eurocrypt 2003, Volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified desing of witness hiding protocols
-
Advances in Cryptology - Crypto'94, Springer-Verlag
-
Ronald Cramer, Ivan Damgard, and Berry Schoenmakers. Proofs of Partial Knowledge and Simplified Desing of Witness Hiding Protocols. Advances in Cryptology - Crypto'94, Volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
10
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM Press
-
Ran Canetti, Oded Goldreich, and Shai Halevi. The Random Oracle Methodology, Revisited. Proceedings of the Annual Symposium on the Theory of Computing (STOC) 1998, pages 209-218. ACM Press, 1998.
-
(1998)
Proceedings of the Annual Symposium on the Theory of Computing (STOC) 1998
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
84921068281
-
On the exact security of full domain hash
-
Advances in Cryptology - Crypto 2000, Springer-Verlag
-
Jean-Sebastien Coron. On the Exact Security of Full Domain Hash. Advances in Cryptology - Crypto 2000, Volume 1880 of Lecture Notes in Computer Science, pages 229-235. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
12
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
-
Jean-Sebastien Coron. Optimal Security Proofs for PSS and Other Signature Schemes. Advances in Cryptology - Eurocrypt 2002, Volume 2332 of Lecture Notes in Computer Science, pages 272-287. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
13
-
-
85001025766
-
Wallet databases with observers
-
Advances in Cryptology - Crypto'92, Springer-Verlag
-
David Chaum and Torben Pedersen. Wallet Databases with Observers. Advances in Cryptology - Crypto'92, Volume 740 of Lecture Notes in Computer Science, pages 89-105. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
14
-
-
84958950087
-
On monotone formula closure of SZK
-
IEEE Computer Society Press
-
Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung. On Monotone Formula Closure of SZK. Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS)'94, pages 454-465. IEEE Computer Society Press, 1994.
-
(1994)
Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS)'94
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
15
-
-
84947730530
-
On the performance of signature schemes based on elliptic curves
-
Algorithmic Number Theory Symposium - ANTS-III, Springer-Verlag
-
Erik De Win, Serge Mister, Bart Preneel, and Michael Wiener. On the Performance of Signature Schemes Based on Elliptic Curves. Algorithmic Number Theory Symposium - ANTS-III, Volume 1423 of Lecture Notes in Computer Science, pages 252-266. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 252-266
-
-
De Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
-
17
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature schemes
-
Advances in Cryptology - Crypto'86, Springer-Verlag
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Schemes. Advances in Cryptology - Crypto'86, Volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1986.
-
(1986)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
18
-
-
35248836947
-
Signature scheme as secure as the diffie-hellman problem
-
Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
-
Eu-Jin Goh and Stanislaw Jarecki. Signature Scheme as Secure as the Diffie-Hellman Problem. Advances in Cryptology - Eurocrypt 2003, Volume 2656 of Lecture Notes in Computer Science, pages 401-415. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 401-415
-
-
Goh, E.-J.1
Jarecki, S.2
-
19
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory
-
Advances in Cryptology - Eurocrypt'88, Springer-Verlag
-
Louis Guillou and Jean-Jacques Quisquater. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Trasmission and Memory. Advances in Cryptology - Eurocrypt'88, Volume 330 of Lecture Notes in Computer Science, pages 123-128. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.-J.2
-
22
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Advances in Cryptology - Crypto'87, Springer-Verlag
-
R. Merkle. A Digital Signature Based on a Conventional Encryption Function. Advances in Cryptology - Crypto'87, Volume 293 of Lecture Notes in Computer Science, pages 369-378. Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 369-378
-
-
Merkle, R.1
-
23
-
-
35048817517
-
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
-
Theory of Cryptography Conference (TCC) 2004, Springer-Verlag
-
Ueli Maurer, Renato Renner, and Clemens Holenstein. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. Theory of Cryptography Conference (TCC) 2004, Volume 2951 of Lecture Notes in Computer Science, pages 21-39. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
24
-
-
35248837045
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Advances in Cryptology - Crypto 2003, Springer-Verlag
-
Daniele Micciancio and Salil Vadhan. Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. Advances in Cryptology - Crypto 2003, Volume 2729 of Lecture Notes in Computer Science, pages 282-298. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 282-298
-
-
Micciancio, D.1
Vadhan, S.2
-
25
-
-
84875762817
-
Provable secure and practical identification schemes and corresponding signature schemes
-
Advances in Cryptology - Crypto'92, Springer-Verlag
-
T. Okamoto. Provable Secure and Practical Identification Schemes and Corresponding Signature Schemes. Advances in Cryptology - Crypto'92, Volume 740 of Lecture Notes in Computer Science, pages 31-53. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
26
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
Advances in Cryptology - Crypto 2003, Springer-Verlag
-
Rafael Pass. On Deniability in the Common Reference String and Random Oracle Model. Advances in Cryptology - Crypto 2003, Volume 2729 of Lecture Notes in Computer Science, pages 316-337. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 316-337
-
-
Pass, R.1
-
27
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David Pointcheval and Jacques Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13(3):361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
28
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4:161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
29
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Victor Shoup and Rosario Gennaro. Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Journal of Cryptology, 15(2):75-96, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
|