-
1
-
-
84958744427
-
1-out-of-n Signatures from a Variety of Keys
-
Y. Zheng, editor, Advances in Cryptology, ASIA CRYPT 2002, Proceedings, of, Springer
-
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Y. Zheng, editor, Advances in Cryptology - ASIA CRYPT 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 415-432. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
2
-
-
35048832490
-
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
-
M. Bellare, A. Boldyreva, and A. Palacio. An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 171-188. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
3
-
-
35248843604
-
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
-
E. Biham, editor, Advanaes in Cryptology, EUROCRYPT 2003, Proceedings, of, Springer
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In E. Biham, editor, Advanaes in Cryptology - EUROCRYPT 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
5
-
-
38049081423
-
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. To appear in TCC 06. Cryptology ePrint Archive
-
Report 2005/304
-
A. Bender, J. Katz, arid R. Morselli. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. To appear in TCC 06. Cryptology ePrint Archive, Report 2005/304, 2005.
-
(2005)
-
-
Bender, A.1
Katz, J.2
arid, R.3
Morselli4
-
6
-
-
35048848152
-
Short signatures without random oracles
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
-
D. Boneh and X. Boyen. Short signatures without random oracles. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 56-73. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
E. Biham, editor, Advances in Cryptology, EUROCRYPT 2003, Proceedings, of, Springer
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
8
-
-
84946840347
-
Short Signat-ures from the Weil Pairing
-
C. Boyd, editor, Advances in Cryptology, ASIACRYPT 2001, Proceedings, of, Springer
-
D. Boneh, B. Lynn, and H. Shacham. Short Signat-ures from the Weil Pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
84937420077
-
Threshold Ring Signatures arid Applications to Ad-hoc Groups
-
M. Yurig, editor, Advances in Cryptology, CRYPTO 2002, Proceedings, of, Springer
-
E. Bresson, J. Stern, and M. Szydlo. Threshold Ring Signatures arid Applications to Ad-hoc Groups. In M. Yurig, editor, Advances in Cryptology - CRYPTO 2002, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
10
-
-
84958612917
-
-
J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, Proceedings, 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
-
J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, Proceedings, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
-
-
-
-
11
-
-
0031619016
-
The Random Oracle Methodology, Revisited
-
R. Canetti, O. Goldreich, arid S. Halevi. The Random Oracle Methodology, Revisited. In STOC, pages 209-218, 1998.
-
(1998)
STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
arid, S.3
Halevi4
-
12
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor, Advances in Cryptology, EUROCRYPT '91, Proceedings, of, Springer
-
D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Proceedings, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
13
-
-
24944525692
-
-
S. Chow, L. Hui, and S. Yiu. Identity Based Threshold Ring Signature. In Information Security and Cryptology - ICISC 2004, Revised Papers, 3506 of Lecture Notes in Computer Science, pages 218-232, Seoul, Korea, 2004. Springer-Verlag. Also available at Cryptology ePrint Archive, Report 2004/179.
-
S. Chow, L. Hui, and S. Yiu. Identity Based Threshold Ring Signature. In Information Security and Cryptology - ICISC 2004, Revised Papers, volume 3506 of Lecture Notes in Computer Science, pages 218-232, Seoul, Korea, 2004. Springer-Verlag. Also available at Cryptology ePrint Archive, Report 2004/179.
-
-
-
-
14
-
-
26444540788
-
-
S. Chow, S. Yiu, and L. Hui. Efficient Identity Based Ring Signature . In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, 3531 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 2005. Also available at Cryptology ePrint Archive, Report 2004/327.
-
S. Chow, S. Yiu, and L. Hui. Efficient Identity Based Ring Signature . In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, volume 3531 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 2005. Also available at Cryptology ePrint Archive, Report 2004/327.
-
-
-
-
15
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Y. Desmedt, editor, Advances in Cryptology, CRYPTO '94, Proceedings, of, Springer
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Proceedings, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
16
-
-
35048854233
-
Anonymous Identification in Ad Hoc Groups
-
C. Cachin and J. Cameriisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
-
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup. Anonymous Identification in Ad Hoc Groups. In C. Cachin and J. Cameriisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 609-626. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
17
-
-
34748860016
-
Perfect Non-Interactive Zero Knowledge for NP. Cryptology ePrint Archive
-
Report 2005/290
-
J. Groth, R. Ostrovsky, and A. Sahai. Perfect Non-Interactive Zero Knowledge for NP. Cryptology ePrint Archive, Report 2005/290, 2005.
-
(2005)
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
18
-
-
35048878760
-
Multi-designated Verifiers Signatures
-
J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, of, Springer-Verlag
-
F. Laguillaumie and D. Vergnaud. Multi-designated Verifiers Signatures. In J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 495-507. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
19
-
-
84946833891
-
How to Leak a Secret
-
C. Boyd, editor, Advances in Cryptology, ASIA CRYPT 2001, Proceedings, of, Springer
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to Leak a Secret. In C. Boyd, editor, Advances in Cryptology - ASIA CRYPT 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
20
-
-
26444566695
-
Non-Interactive Deniable Ring Authentication
-
J. I. Lim and D. H. Lee, editors, Information Security and Cryptology, ICISC 2003, Revised Papers, of, Springer-Verlag
-
W. Susilo and Y. Mu. Non-Interactive Deniable Ring Authentication. In J. I. Lim and D. H. Lee, editors, Information Security and Cryptology - ICISC 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 386-401. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2971
, pp. 386-401
-
-
Susilo, W.1
Mu, Y.2
-
21
-
-
26444587096
-
Perfect Concurrent Signature Schemes
-
J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, of, Springer-Verlag, Oct
-
W. Susilo, Y. Mu, and F. Zhang. Perfect Concurrent Signature Schemes. In J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 14-26. Springer-Verlag, Oct. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 14-26
-
-
Susilo, W.1
Mu, Y.2
Zhang, F.3
-
22
-
-
26444498123
-
Tight Reductions among Strong Diffie-Hellman Assumptions. Cryptology ePrint Archive
-
Report 2005/057
-
V. K. Wei. Tight Reductions among Strong Diffie-Hellman Assumptions. Cryptology ePrint Archive, Report 2005/057, 2005.
-
(2005)
-
-
Wei, V.K.1
-
23
-
-
23944519368
-
A Ring Signature Scheme Using Bilinear Pairings
-
C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, WISA, Revised Papers, of, Springer-Verlag
-
J. Xu, Z. Zhang, and D. Feng. A Ring Signature Scheme Using Bilinear Pairings. In C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 163-172. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 163-172
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
24
-
-
84958765355
-
ID-Based Blind Signature and Ring Signature from Pairings
-
Y. Zheng, editor, Advances in Cryptology, ASIA CRYPT 2002, Proceedings, of, Springer
-
F. Zhang and K. Kim. ID-Based Blind Signature and Ring Signature from Pairings. In Y. Zheng, editor, Advances in Cryptology - ASIA CRYPT 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 533-547. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
25
-
-
35048854587
-
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao, R. H. Deng, and J. Zhou, editors, Public Key Cryptography - PKC 2004, Proceedings, 2947 of Lecture, Notes in Computer Science, pages 277-290. Springer, 2004.
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao, R. H. Deng, and J. Zhou, editors, Public Key Cryptography - PKC 2004, Proceedings, volume 2947 of Lecture, Notes in Computer Science, pages 277-290. Springer, 2004.
-
-
-
|