-
1
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Advances in Cryptology - Asiacrypt 2002
-
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. Advances in Cryptology - Asiacrypt 2002, Lecture Notes in Computer Science 2501, pages 415 - 432, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
85024290278
-
Group signatures
-
Advances in Cryptology - Eurocrypt '91
-
D. Chaum and E. van Heyst. Group signatures. Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science 547, pages 257 - 265, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
3
-
-
33750081822
-
Verifier-designated signatures
-
Rump Session
-
Y. Desmedt. Verifier-Designated Signatures. Rump Session, Crypto 2003, 2003.
-
(2003)
Crypto 2003
-
-
Desmedt, Y.1
-
4
-
-
0017018484
-
New directions in cryptography
-
W. Dime and M. Hellman. New directions in cryptography. IEEE IT, 22:644 - 654, 1976.
-
(1976)
IEEE IT
, vol.22
, pp. 644-654
-
-
Dime, W.1
Hellman, M.2
-
5
-
-
84927752554
-
Designated verifier proofs and their applications
-
Advances in Cryptology - Eurocrypt '96
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070, pages 143 - 154, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
6
-
-
35048878760
-
Multi-designated verifiers signatures
-
Sixth International Conference on Information and Communications Security (ICICS 2004)
-
F. Laguillaumie and D. Vergnaud. Multi-Designated Verifiers Signatures. Sixth International Conference on Information and Communications Security (ICICS 2004), Lecture Notes in Computer Science, pages 495 - 507, 2004.
-
(2004)
Lecture Notes in Computer Science
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
8
-
-
84946833891
-
How to leak a secret advances in cryptology - Asiacrypt 2001
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to Leak a Secret Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248, pages 552 - 565, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
22144444595
-
Anonymous authentication: For privacy and security
-
Special Issue on Security for Network Society
-
K. Sako, S. Yonezawa, and I. Teranishi. Anonymous Authentication: For Privacy and Security. NEC Journal of Advanced Technology, Special Issue on Security for Network Society, Vol. 2 No. 1, pages 79 - 83, 2005.
-
(2005)
NEC Journal of Advanced Technology
, vol.2
, Issue.1
, pp. 79-83
-
-
Sako, K.1
Yonezawa, S.2
Teranishi, I.3
-
10
-
-
0345058957
-
Universal designated-verifier signatures
-
Proceedings of Asiacrypt 2003
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk. Universal Designated-Verifier Signatures. Proceedings of Asiacrypt 2003, Lecture Notes in Computer Science 2894, pages 523 - 543, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 523-543
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
11
-
-
35048841170
-
Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures
-
Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004)
-
R. Steinfeld, H. Wang, and J. Pieprzyk. Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science 2947, pages 86 - 100, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
|