-
1
-
-
84946833891
-
How to leak a secret
-
Rivest, R.L., Shamir, A., and Tauman, Y.: ' How to leak a secret ', Lect. Notes Comput. Sci., 2001, 2248, p. 552-565
-
(2001)
Lect. Notes Comput. Sci.
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Abe, M., Ohkubo, M., and Suzuki, K.: ' 1-out-of-n signatures from a variety of keys ', Lect. Notes Comput. Sci., 2002, 2501, p. 415-432
-
(2002)
Lect. Notes Comput. Sci.
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
3
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Zhang, F., and Kim, K.: ' ID-based blind signature and ring signature from pairings ', Lect. Notes Comput. Sci., 2002, 2501, p. 533-547
-
(2002)
Lect. Notes Comput. Sci.
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
4
-
-
33750014150
-
-
Herranz, J., and Saez. G.: 'A provably secure ID-based ring signature scheme', Cryptology ePrint Archive, Report 2003/261, 2003, http://eprint.iacr. org/
-
Herranz, J., and Saez. G.: 'A provably secure ID-based ring signature scheme', Cryptology ePrint Archive, Report 2003/261, 2003, http://eprint.iacr. org/
-
-
-
-
5
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups
-
Liu, J.K., Wei, V.K., and Wong, D.S.: ' Linkable spontaneous anonymous group signature for ad hoc groups ', Lect. Notes Comput. Sci., 2004, 3108, p. 325-335
-
(2004)
Lect. Notes Comput. Sci.
, vol.3108
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
6
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
Nguyen, L.: ' Accumulators from bilinear pairings and applications ', Lect. Notes Comput. Sci., 2005, 3376, p. 275-292
-
(2005)
Lect. Notes Comput. Sci.
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
7
-
-
33646732391
-
Colluding attacks to a payment protocol and two signature exchange schemes
-
Bao, F.: ' Colluding attacks to a payment protocol and two signature exchange schemes ', Lect. Notes Comput. Sci., 2004, 3329, p. 417-429
-
(2004)
Lect. Notes Comput. Sci.
, vol.3329
, pp. 417-429
-
-
Bao, F.1
-
8
-
-
33749986140
-
-
Wei, V.K.: A bilinear spontaneous anonymous threshold signature for ad hoc groups', Cryptology ePrint Archive, Report 2004/039, 2004, http://eprint.iacr.org/
-
Wei, V.K.: A bilinear spontaneous anonymous threshold signature for ad hoc groups', Cryptology ePrint Archive, Report 2004/039, 2004, http://eprint.iacr.org/
-
-
-
-
9
-
-
33750021559
-
-
ETH Technical Report No. 260 1997 ftp://ftinf.ethz.ch/pub/publications/ tech-reports/
-
' Proof systems for general systems of discrete logarithms ', ETH Technical Report, No. 260, 1997, ftp://ftp.inf.ethz.ch/pub/publications/tech- reports/
-
-
-
-
10
-
-
33749991714
-
-
Lipmaa, H.: 'Proofs of knowledge of certain problems', http://www.cs.ut.ee/helger/crypto/link/zeroknowledge/pok.php
-
Lipmaa, H.: 'Proofs of knowledge of certain problems', http://www.cs.ut.ee/helger/crypto/link/zeroknowledge/pok.php
-
-
-
-
11
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Bellare, M., and Palacio, A.: ' GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks ', Lect. Notes Comput. Sci., 2002, 2442, p. 162-177
-
(2002)
Lect. Notes Comput. Sci.
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
|