-
1
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
Springer-Verlag LNCS
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. In Proc. EUROCRYPT 98, pages 591-606. Springer-Verlag, 1998. LNCS Vol. 1403.
-
(1998)
Proc. EUROCRYPT 98
, vol.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
2
-
-
84954410864
-
An efficient verifiable encryption scheme for encryption of discrete logarithms
-
Springer-Verlag. LNCS
-
F. Bao. An efficient verifiable encryption scheme for encryption of discrete logarithms. In Proc. Smart Card Research and Applications (CARDIS) 1998, pages 213-220. Springer-Verlag, 2000. LNCS Vol. 1820.
-
(2000)
Proc. Smart Card Research and Applications (CARDIS) 1998
, vol.1820
, pp. 213-220
-
-
Bao, F.1
-
3
-
-
84946837370
-
Key-privacy in public-key encryption
-
Springer-Verlag. LNCS
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In Proc. ASIACRYPT 2001, pages 566-582. Springer-Verlag, 2001. LNCS Vol. 2248.
-
(2001)
Proc. ASIACRYPT 2001
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer-Verlag. LNCS
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. CRYPTO 96, pages 1-15. Springer-Verlag, 1996. LNCS Vol. 1109.
-
(1996)
Proc. CRYPTO 96
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
Springer-Verlag, LNCS
-
J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In Proc. ASIACRYPT 2000, pages 331-345. Springer-Verlag, 2000. LNCS Vol. 1976.
-
(2000)
Proc. ASIACRYPT 2000
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
7
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocations
-
Springer-Verlag. LNCS
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocations. In Proc. EUROCRYPT 2001, pages 93-118. Springer-Verlag, 2001. LNCS Vol. 2045.
-
(2001)
Proc. EUROCRYPT 2001
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Springer-Verlag. LNCS
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Proc. CRYPTO 2003, pages 126-144. Springer-Verlag, 2003. LNCS Vol. 2729.
-
(2003)
Proc. CRYPTO 2003
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
10
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
Springer-Verlag. LNCS
-
R. Canetti and S. Goldwasser. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In Proc. EUROCRYPT 99, pages 90-106. Springer-Verlag, 1999. LNCS Vol. 1592.
-
(1999)
Proc. EUROCRYPT 99
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
11
-
-
85023809951
-
Threshold cryptosystem
-
Springer-Verlag. LNCS
-
Y. Desmedt and Y. Frankel. Threshold cryptosystem. In Proc. CRYPTO 89, pages 307-315. Springer-Verlag, 1989. LNCS Vol. 435.
-
(1989)
Proc. CRYPTO 89
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
33745754520
-
Custodian-hiding verifiable encryption
-
Springer-Verlag. LNCS
-
J. Liu, V. Wei, and D. Wong. Custodian-hiding verifiable encryption. In WISA 2004, pages 54-67. Springer-Verlag, 2004. LNCS Vol. 3325.
-
(2004)
WISA 2004
, vol.3325
, pp. 54-67
-
-
Liu, J.1
Wei, V.2
Wong, D.3
-
13
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Springer. LNCS
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Proc. CRYPTO 91, pages 433-444. Springer, 1992. LNCS Vol. 576.
-
(1992)
Proc. CRYPTO 91
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
14
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Springer-Verlag. LNCS
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. In Proc. EUROCRYPT 98, pages 1-16. Springer-Verlag, 1998. LNCS Vol. 1403.
-
(1998)
Proc. EUROCRYPT 98
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
15
-
-
84947917119
-
Publicly verifiable secret sharing
-
Springer-Verlag. LNCS
-
M. Stadler. Publicly verifiable secret sharing. In Proc. EUROCRYPT 96, pages 191-199. Springer-Verlag, 1996. LNCS Vol. 1070.
-
(1996)
Proc. EUROCRYPT 96
, vol.1070
, pp. 191-199
-
-
Stadler, M.1
|