-
1
-
-
84941149223
-
-
Portia project, website. crypto.stanford.edu/portia
-
Portia project, website. crypto.stanford.edu/portia.
-
-
-
-
2
-
-
84941158080
-
-
PRIME project, website. www.prime-project.eu.org.
-
-
-
-
3
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
April
-
N. Asokan, Victor Shoup, and Michael Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):591-610, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 591-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000. Springer Verlag
-
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of LNCS, pages 255-270. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
5
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Walter Fumy, editor, Advances in Cryptology EUROCRYPT '97. Springer Verlag
-
Niko Barić and Birgit Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Walter Fumy, editor, Advances in Cryptology EUROCRYPT '97, volume 1233 of LNCS, pages 480-494. Springer Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 480-494
-
-
Barić, N.1
Pfitzmann, B.2
-
6
-
-
84983104598
-
On defining proofs of knowledge
-
Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92. Springer-Verlag
-
Mihir Bellare and Oded Goldreich. On defining proofs of knowledge. In Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of LNCS, pages 390-420. Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001. Springer Verlag
-
Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
84867248592
-
Untraceable off-line cash in wallets with observers
-
Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93
-
Stefan Brands. Untraceable off-line cash in wallets with observers. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93, volume 773 of LNCS, pages 302-318, 1993.
-
(1993)
LNCS
, vol.773
, pp. 302-318
-
-
Brands, S.1
-
11
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
October
-
Gilles Brassard, David Chaum, and Claude Crépeau. Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences, 37(2):156-189, October 1988.
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
13
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
-
Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000. Springer Verlag
-
Jan Camenisch and Ivan Damgård. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 331-345. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
15
-
-
33749684958
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
IBM Research Division, November
-
Jan Camenisch and Anna Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Technical Report Research Report RZ 3295, IBM Research Division, November 2000.
-
(2000)
Technical Report Research Report
, vol.RZ 3295
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001. Springer Verlag
-
Jan Camenisch and Anna Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of LNCS, pages 93-118. Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35248839965
-
A signature scheme with efficient protocols
-
Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002. Springer Verlag
-
Jan Camenisch and Anna Lysyanskaya. A signature scheme with efficient protocols. In Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of LNCS, pages 268-289. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
(to appear), LNCS. Springer Verlag
-
Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology - CRYPTO 2004 (to appear), LNCS. Springer Verlag, 2004.
-
(2004)
Advances in Cryptology - CRYPTO 2004
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
84947809553
-
A group signature scheme with improved efficiency
-
Kazuo Ohta and Dinqyi Pei, editors, Advances in Cryptology - ASIACRYPT '98. Springer Verlag
-
Jan Camenisch and Markus Michels. A group signature scheme with improved efficiency. In Kazuo Ohta and Dinqyi Pei, editors, Advances in Cryptology - ASIACRYPT '98, volume 1514 of LNCS, pages 160-174. Springer Verlag, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 160-174
-
-
Camenisch, J.1
Michels, M.2
-
20
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
Michael Wiener, editor, Advances in Cryptology - CRYPTO '99. Springer Verlag
-
Jan Camenisch and Markus Michels. Separability and efficiency for generic group signature schemes. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 413-430. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
21
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Dan Boneh, editor, Advances in Cryptology - CRYPTO 2003
-
Jan Camenisch and Victor Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Dan Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 126-144, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
22
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Burt Kaliski, editor, Advances in Cryptology - CRYPTO '97. Springer Verlag
-
Jan Camenisch and Markus Stadier. Efficient group signature schemes for large groups. In Burt Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1296 of LNCS, pages 410-424. Springer Verlag, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadier, M.2
-
25
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
26
-
-
0020915882
-
Blind signatures for untraceable payments
-
David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors. Plenum Press
-
David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology - Proceedings of CRYPTO '82, pages 199-203. Plenum Press, 1983.
-
(1983)
Advances in Cryptology - Proceedings of CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
27
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
October
-
David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, October 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
28
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86. Springer-Verlag
-
David Chaum and Jan-Hendrik Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 118-167. Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
29
-
-
84929273746
-
Untraceable electronic cash
-
Shaft Goldwasser, editor, Advances in Cryptology - CRYPTO '88. Springer Verlag
-
David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Shaft Goldwasser, editor, Advances in Cryptology - CRYPTO '88, volume 403 of LNCS, pages 319-327. Springer Verlag, 1990.
-
(1990)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
30
-
-
85024290278
-
Group signatures
-
Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91. Springer-Verlag
-
David Chaum and Eugène van Heyst. Group signatures. In Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of LNCS, pages 257-265. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
31
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, Berlin. Springer Verlag
-
Ronald Cramer and Victor Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, volume 1642 of LNCS, pages 13-25, Berlin, 1998. Springer Verlag.
-
(1998)
LNCS
, vol.1642
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
33
-
-
23044533897
-
An integer commitment scheme based on groups with hidden order
-
Advances in Cryptology - ASIACRYPT 2002. Springer
-
Ivan Damgård and Eiichiro Fujisaki. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology - ASIACRYPT 2002, volume 2501 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2501
-
-
Damgård, I.1
Fujisaki, E.2
-
34
-
-
84947214473
-
Generic lower bounds for root extraction and signature schemes in general groups
-
Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002. Springer
-
Ivan Damgård and Maciej Koprowski. Generic lower bounds for root extraction and signature schemes in general groups. In Lars Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 256-271. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 256-271
-
-
Damgård, I.1
Koprowski, M.2
-
35
-
-
85031802442
-
Payment systems and credential mechanism with provable security against abuse by individuals
-
Shaft Goldwasser, editor, Advances in Cryptology - CRYPTO '88. Springer Verlag
-
Ivan Bjerre Damgård. Payment systems and credential mechanism with provable security against abuse by individuals. In Shaft Goldwasser, editor, Advances in Cryptology - CRYPTO '88, volume 403 of LNCS, pages 328-335. Springer Verlag, 1990.
-
(1990)
LNCS
, vol.403
, pp. 328-335
-
-
Damgård, I.B.1
-
36
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86. Springer Verlag
-
Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 186-194. Springer Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
37
-
-
33749681317
-
Witness hiding protocols to confirm modular polynomial relations
-
Fukuoka, Japan, January. The Institute of Electronics, Information and Communcation Engineers. SCSI97-33D
-
Eiichiro Fujisaki and Tatsuaki Okamoto. Witness hiding protocols to confirm modular polynomial relations. In The 1997 Symposium on Cryptograpy and Information Security, Fukuoka, Japan, January 1997. The Institute of Electronics, Information and Communcation Engineers. SCSI97-33D.
-
(1997)
The 1997 Symposium on Cryptograpy and Information Security
-
-
Fujisaki, E.1
Okamoto, T.2
-
38
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002. Springer Verlag
-
Craig Gentry and Alice Silverberg. Hierarchical ID-based cryptography. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, volume 2501 of LNCS, pages 548-566. Springer Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
41
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
Shafi Goldwasser, Silvio Micali, and Ronald Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
42
-
-
84946844750
-
A one-round protocol for tripartite Diffie-Hellman
-
Proceedings of the ANTS-IV conference. Springer-Verlag
-
Antoine Joux. A one-round protocol for tripartite Diffie-Hellman. In Proceedings of the ANTS-IV conference, volume 1838 of LNCS, pages 385-394. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
45
-
-
67651053584
-
Pseudonym systems
-
Howard Keys and Carlisle Adams, editors, Selected Areas in Cryptography. Springer Verlag
-
Anna Lysyanskaya, Ron Rivest, Amit Sahai, and Stefan Wolf. Pseudonym systems. In Howard Keys and Carlisle Adams, editors, Selected Areas in Cryptography, volume 1758 of LNCS. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
46
-
-
84942550998
-
Public-key cryptosystems based on composite residuosity classes
-
Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99. Springer Verlag
-
Pascal Paillier. Public-key cryptosystems based on composite residuosity classes. In Jacques Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pages 223-239. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-239
-
-
Paillier, P.1
-
47
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91. Springer Verlag
-
Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 129-140. Springer Verlag, 1992.
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
48
-
-
84927727752
-
Security proofs for signature schemes
-
Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT '96. Springer Verlag
-
David Pointcheval and Jacques Stern. Security proofs for signature schemes. In Ueli Maurer, editor, Advances in Cryptology - EUROCRYPT '96, volume 1070 of LNCS, pages 387-398. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
50
-
-
84946849368
-
Self-blindable credential certificates from the weil pairing
-
Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001. Springer Verlag
-
Eric Verheul. Self-blindable credential certificates from the weil pairing. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of LNCS, pages 533-551. Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 533-551
-
-
Verheul, E.1
|