-
1
-
-
33646840349
-
On the minimal assumptions of group signature schemes
-
L. Lopez, S. Qing, and E. Okamoto, editors, The 2004 International Conference on Information and Communications Security - ICICS 2004, Berlin, Heidelberg, New York. Springer-Verlag
-
M. Abdalla and B. Warinschi. On the minimal assumptions of group signature schemes. In L. Lopez, S. Qing, and E. Okamoto, editors, The 2004 International Conference on Information and Communications Security - ICICS 2004, volume 3269 of Lecture Notes in Computer Science, pages 1-13, Berlin, Heidelberg, New York, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 1-13
-
-
Abdalla, M.1
Warinschi, B.2
-
2
-
-
0842331901
-
L-out-of-n signatures from a variety of keys
-
M. Abe, M. Ohkubo, and K. Suzuki. l-out-of-n signatures from a variety of keys. IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences, E87-A (1):131-140, 2004.
-
(2004)
IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences
, vol.E87-A
, Issue.1
, pp. 131-140
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
3
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, Berlin, Heidelberg, New York. Springer-Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270, Berlin, Heidelberg, New York, 2000. Springer-Verlag.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Berlin, Heidel-berg, New York. Springer-Verlag
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-629, Berlin, Heidel-berg, New York, 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
A. Menezes, editor, Topics in Cryptography - CT-RSA 2005, Berlin, Heidelberg, New York. Springer-Verlag
-
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. In A. Menezes, editor, Topics in Cryptography - CT-RSA 2005, volume 3376 of Lecture Notes in Computer Science, pages 136-153, Berlin, Heidelberg, New York, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
7
-
-
84947778144
-
The decision diffie-hellman problem
-
J. Buhler, editor, Algorithmic Number Theory, Third International Symposium - ANTS-III, Berlin, Heidelberg, New York. Springer-Verlag
-
D. Boneh. The decision diffie-hellman problem. In J. Buhler, editor, Algorithmic Number Theory, Third International Symposium - ANTS-III, volume 1423 of Lecture Notes in Computer Science, pages 48-63, Berlin, Heidelberg, New York, 1998. Springer-Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
8
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspect
-
C. Blundo and S. Cimato, editors, SCN '04, Berlin, Heidelberg, New York. Springer-Verlag
-
J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspect. In C. Blundo and S. Cimato, editors, SCN '04, volume 3352 of Lecture Notes in Computer Science, pages 120-133, Berlin, Heidelberg, New York, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
9
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, Berlin, Heidelberg, New York. Springer-Verlag
-
D. Chaum. Zero-knowledge undeniable signatures. In I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, volume 473 of Lecture Notes in Computer Science, pages 458-464, Berlin, Heidelberg, New York, 1991. Springer-Verlag.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 458-464
-
-
Chaum, D.1
-
10
-
-
85001025766
-
Wallet databeses with observers
-
E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, Berlin, Heidelberg, New York. Springer-Verlag
-
D. Chaum and P. Pedersen. Wallet databeses with observers. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105, Berlin, Heidelberg, New York, 1993. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, P.2
-
11
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor, Berlin. Springer-Verlag. Lecture Notes in Computer Science
-
D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EuroCrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 547.
-
(1991)
Advances in Cryptology - EuroCrypt '91
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
12
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Berlin, Heidelberg, New York. Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 893 of Lecture Notes in Computer Science, pages 174-187, Berlin, Heidelberg, New York, 1995. Springer-Verlag.
-
(1995)
Lecture Notes in Computer Science
, vol.893
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
79960836060
-
Deniable ring authentication
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Berlin, Heidelberg, New York. Springer-Verlag
-
M. Naor. Deniable ring authentication. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 481-498, Berlin, Heidelberg, New York, 2002. Springer-Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
14
-
-
24144448778
-
The security of the fdh variant of chaum's undeniable signature scheme
-
S. Vaudenay, editor, Public Key Cryptography -PKC 2005, Berlin, Heidelberg, New York. Springer-Verlag
-
W. Ogata, K. Kurosawa, and S.-H. Heng. The security of the fdh variant of chaum's undeniable signature scheme. In S. Vaudenay, editor, Public Key Cryptography -PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 328-345, Berlin, Heidelberg, New York, 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 328-345
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.-H.3
-
15
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
K. Kim, editor, Public Key Cryptography - PKC 2001, Berlin, Heidelberg, New York. Springer-Verlag
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In K. Kim, editor, Public Key Cryptography - PKC 2001, volume 1992 of Lecture Notes in Computer Science, pages 104-118, Berlin, Heidelberg, New York, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
16
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
17
-
-
84946833891
-
How to leak a secret
-
C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, Berlin, Heidelberg, New York. Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 526-565, Berlin, Heidelberg, New York, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 526-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
|