-
1
-
-
0026383119
-
Noninteractive zero-knowledge
-
December
-
Manuel Blum, Alfredo De Santis, Silvio Micali, and Giuseppe Persiano. Noninteractive zero-knowledge. SIAM Journal on Computing, 20(6):1084–1118, December 1991.
-
(1991)
SIAM Journal on Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
Santis, A.D.2
Micali, S.3
Persiano, G.4
-
2
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
November
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–863, November 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-863
-
-
Blum, M.1
Micali, S.2
-
3
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
In Michael Wiener, editor, Springer-Verlag, 15–19 August
-
A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Michael Wiener, editor, Advances in Cryptology—CRYPTO’99, volume 1666 of Lecture Notes in Computer Science, pages 80–97. Springer-Verlag, 15–19 August 1999.
-
(1999)
Advances in Cryptology—CRYPTO’99, Volume 1666 of Lecture Notes in Computer Science
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
4
-
-
84957802212
-
Efficient zeroknowledge proofs of knowledge without intractability assumptions
-
Springer-Verlag
-
Ronald Cramer, Ivan Damg˚ard, and Philip MacKenzie. Efficient zeroknowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography (PKC 2000), pages 354–372. Springer-Verlag, 2000.
-
(2000)
Public Key Cryptography (PKC 2000)
, pp. 354-372
-
-
Cramer, R.1
Ivan, D.2
Mackenzie, P.3
-
5
-
-
84880897758
-
-
Universally composable commitments. In Joe Kilian, editor, Springer-Verlag, 19–23 August
-
R. Canetti and M. Fischlin. Universally composable commitments. In Joe Kilian, editor, Advances in Cryptology—CRYPTO 2001, Lecture Notes in Computer Science. Springer-Verlag, 19–23 August 2001.
-
(2001)
Advances in Cryptology—CRYPTO 2001, Lecture Notes in Computer Science
-
-
Canetti, R.1
Fischlin, M.2
-
6
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In 26th IEEE Symposium on Foundations of Computer Science, pages 383–395, 1985.
-
(1985)
26Th IEEE Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against chosen ciphertext attack
-
In Hugo Krawczyk, editor, Springer-Verlag, 23–27 August
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology—CRYPTO’98, volume 1462 of Lecture Notes in Computer Science. Springer-Verlag, 23–27 August 1998.
-
(1998)
Advances in Cryptology—CRYPTO’98, Volume 1462 of Lecture Notes in Computer Science
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM, 30:391–437, 2000.
-
(2000)
SIAM
, vol.30
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
10
-
-
84974625311
-
Necessary and sufficient assumptions for non-interactive zero-knowledge proofs of knowledge for all np relations
-
In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Springer-Verlag, July 9–15
-
Alfredo De Santis, Giovanni Di Crescenzo, and Giuseppe Persiano. Necessary and sufficient assumptions for non-interactive zero-knowledge proofs of knowledge for all np relations. In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Automata Languages and Programming: 27th International Colloquim (ICALP 2000), volume 1853 of Lecture Notes in Computer Science, pages 451–462. Springer-Verlag, July 9–15 2000.
-
(2000)
Automata Languages and Programming: 27Th International Colloquim (ICALP 2000), Volume 1853 of Lecture Notes in Computer Science
, pp. 451-462
-
-
Santis, A.D.1
di Crescenzo, G.2
Persiano, G.3
-
11
-
-
0031642212
-
Non-interactive and nonmalleable commitment
-
Dallas, Texas, 23–26 May
-
G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Non-interactive and nonmalleable commitment. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, Texas, 23–26 May 1998.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing,
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
12
-
-
84945133720
-
Efficient and noninteractive non-malleable commitment
-
In Birgit Pfitzmann, editor, Springer-Verlag, 6–10 May
-
G. Di Crescenzo, J. Katz, R. Ostrovsky, and A. Smith. Efficient and noninteractive non-malleable commitment. In Birgit Pfitzmann, editor, Advances in Cryptology—EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 40–59. Springer-Verlag, 6–10 May 2001.
-
(2001)
Advances in Cryptology—EUROCRYPT 2001, Volume 2045 of Lecture Notes in Computer Science
, pp. 40-59
-
-
Di Crescenzo, G.1
Katz, J.2
Ostrovsky, R.3
Smith, A.4
-
13
-
-
85028462775
-
Zero-knowledge proofs of knowledge without interaction
-
Pittsburgh, Pennsylvania, 24–27 October, IEEE
-
Alfredo De Santis and Giuseppe Persiano. Zero-knowledge proofs of knowledge without interaction. In 33rd Annual Symposium on Foundations of Computer Science, pages 427–436, Pittsburgh, Pennsylvania, 24–27 October 1992. IEEE.
-
(1992)
33Rd Annual Symposium on Foundations of Computer Science
, pp. 427-436
-
-
Santis, A.D.1
Persiano, G.2
-
14
-
-
84983134965
-
Efficient non-malleable commitment schemes
-
In Mihir Bellare, editor, Springer-Verlag, 20–24 August
-
M. Fischlin and R. Fischlin. Efficient non-malleable commitment schemes. In Mihir Bellare, editor, Advances in Cryptology—CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science. Springer-Verlag, 20–24 August 2000.
-
(2000)
Advances in Cryptology—CRYPTO 2000, Volume 1880 of Lecture Notes in Computer Science
-
-
Fischlin, M.1
Fischlin, R.2
-
15
-
-
0024135240
-
Zero-knowledge proofs of identity
-
Uriel Feige, Amos Fiat, and Adi Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77–94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
16
-
-
84976826800
-
Zero knowledge proofs of knowledge in two rounds
-
In G. Brassard, editor, Springer-Verlag, 20–24 August
-
Uriel Feige and Adi Shamir. Zero knowledge proofs of knowledge in two rounds. In G. Brassard, editor, Advances in Cryptology—CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pages 526–545. Springer-Verlag, 1990, 20–24 August 1989.
-
(1990)
Advances in Cryptology—CRYPTO’89, Volume 435 of Lecture Notes in Computer Science
, pp. 526-545
-
-
Feige, U.1
Shamir, A.2
-
20
-
-
0021941417
-
Knowledge complexity of interactive proofs
-
Providence, Rhode Island, 6–8 May
-
Shafi Goldwasser, Silvio Micali, and Charles Rackoff. Knowledge complexity of interactive proofs. In Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pages 291–304, Providence, Rhode Island, 6–8 May 1985.
-
(1985)
Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
23
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Moni Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151–158, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
24
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
In J. Feigenbaum, editor, Springer-Verlag, August
-
Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology—CRYPTO’91, volume 576 of Lecture Notes in Computer Science, pages 129–140. Springer-Verlag, 1992, 11–15 August 1991.
-
(1992)
Advances in Cryptology—CRYPTO’91, Volume 576 of Lecture Notes in Computer Science
, pp. 129-140
-
-
Pedersen, T.P.1
-
25
-
-
0033342534
-
Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security
-
New York, October, IEEE
-
Amit Sahai. Non-malleable non-interactive zero-knowledge and adaptive chosen-ciphertext security. In 40th Annual Symposium on Foundations of Computer Science, New York, October 1999. IEEE.
-
(1999)
40Th Annual Symposium on Foundations of Computer Science
-
-
Sahai, A.1
-
26
-
-
85032873931
-
Efficient identification and signatures for smart cards
-
In J.-J. Quisquater and J. Vandewalle, editors, Springer-Verlag, 1990, 10–13 April
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology—EUROCRYPT 89, volume 434 of Lecture Notes in Computer Science, pages 688–689. Springer-Verlag, 1990, 10–13 April 1989.
-
(1989)
Advances in Cryptology—EUROCRYPT 89, Volume 434 of Lecture Notes in Computer Science
, pp. 688-689
-
-
Schnorr, C.P.1
-
27
-
-
0023568495
-
Random self-reducibility and zero knowledge interactive proofs of possession of information
-
Los Angeles, California, 12–14 October, IEEE
-
Martin Tompa and Heather Woll. Random self-reducibility and zero knowledge interactive proofs of possession of information. In 28th Annual Symposium on Foundations of Computer Science, pages 472–482, Los Angeles, California, 12–14 October 1987. IEEE.
-
(1987)
28Th Annual Symposium on Foundations of Computer Science
, pp. 472-482
-
-
Tompa, M.1
Woll, H.2
|