-
1
-
-
84946833891
-
How to leak a secret
-
Lect. Notes Comput. Sci.
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In Advances in Cryptology-ASIACRYPT'01, Lect. Notes Comput. Sci., 2248, pages 552-565, 2001.
-
(2001)
Advances in Cryptology-ASIACRYPT'01
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
85024290278
-
Group signatures
-
Donald W. Davies, editor, Berlin. SpringerVerlag. Lecture Notes in Computer Science Volume 547
-
D. Chaum and E. van Heyst. Group signatures. In Donald W. Davies, editor, Advances in Cryptology - EuroCrypt '91, pages 257-265, Berlin, 1991. SpringerVerlag. Lecture Notes in Computer Science Volume 547.
-
(1991)
Advances in Cryptology - EuroCrypt '91
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
3
-
-
33749670552
-
Forking lemmas in the ring signatures' scenario
-
International Association for Cryptologic Research
-
J. Herranz and G. Saez. Forking lemmas in the ring signatures' scenario. Technical Report 067, International Association for Cryptologic Research, http://eprint.iacr.org/2003/067.ps, 2003.
-
(2003)
Technical Report
, vol.67
-
-
Herranz, J.1
Saez, G.2
-
4
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Gilles Brassard, editor, Berlin. Springer-Verlag. Lecture Notes in Computer Science Volume 435
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In Gilles Brassard, editor, Advances in Cryptology - Crypto'89, pages 239-252, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 435.
-
(1989)
Advances in Cryptology - Crypto'89
, pp. 239-252
-
-
Schnorr, C.P.1
-
5
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Lect. Notes Comput. Sci.
-
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n signatures from a variety of keys. In ASIACRYPT, Lect. Notes Comput. Sci., 2501, pages 415-432, 2002.
-
(2002)
ASIACRYPT
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
6
-
-
84955564937
-
Convertible group signature
-
Lect. Notes Comput. Sci.
-
S. J. Kim, S. J. Park, and D. H. Won. Convertible group signature. In Proc. Advances in Cryptology-ASIACRYPT'96, Lect. Notes Comput. Sci., 1163, pages 311-321, 1996.
-
(1996)
Proc. Advances in Cryptology-ASIACRYPT'96
, vol.1163
, pp. 311-321
-
-
Kim, S.J.1
Park, S.J.2
Won, D.H.3
-
7
-
-
24144445109
-
Convertible ring signature
-
August
-
K.-C. Lee, H.-A. Wen, and T. Hwang. Convertible ring signature. IEE Proceedings - Communications, 152(4):411-414, August 2005.
-
(2005)
IEE Proceedings - Communications
, vol.152
, Issue.4
, pp. 411-414
-
-
Lee, K.-C.1
Wen, H.-A.2
Hwang, T.3
-
8
-
-
84958769452
-
Convertible undeniable signatures
-
Lect. Notes Comput. Sci.
-
J. Boyar, D. Chaum, and I. Damgard. Convertible undeniable signatures. In Proc. Advances in Cryptology-CRYPTO'90, Lect. Notes Comput. Sci., 537, pages 189-205, 1991.
-
(1991)
Proc. Advances in Cryptology-CRYPTO'90
, vol.537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgard, I.3
-
9
-
-
33745830188
-
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
-
E. Bangerter, J. Camenisch, and U. Maurer. Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order. In PKC 2005, 2005.
-
(2005)
PKC 2005
-
-
Bangerter, E.1
Camenisch, J.2
Maurer, U.3
-
10
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Lect. Notes Comput. Sci.
-
E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In Proc. Advances in Cryptology-CRYPTO'02, Lect. Notes Comput. Sci., 2442, pages 465-480, 2002.
-
(2002)
Proc. Advances in Cryptology-CRYPTO'02
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
11
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. A. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.A.1
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17(2):281-308, April 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
0028508211
-
Group-oriented (t,n) threshold digital signature scheme and digital multisignature
-
September
-
L. Harn. Group-oriented (t,n) threshold digital signature scheme and digital multisignature. IEE Proc.-Comput. Digit. Tech., 141(5):307-313, September 1994.
-
(1994)
IEE Proc.-comput. Digit. Tech.
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
|