-
1
-
-
57849144405
-
A cryptographic framework for the controlled release of certified data
-
2004 LNCS, Springer Verlag
-
Bangerter, E., Camenisch, J., and Lysyanskaya, A. A cryptographic framework for the controlled release of certified data. In Twelfth International Workshop on Security Protocols 2004 (2004), LNCS, Springer Verlag.
-
(2004)
Twelfth International Workshop on Security Protocols
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
-
2
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
In of LNCS, Springer Verlag
-
Boudot, F. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
-
(2000)
EUROCRYPT
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
3
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
In '97 of LNCS, Springer Verlag
-
Brands, S. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT '97 (1997), vol. 1233 of LNCS, Springer Verlag, pp. 318-333.
-
(1997)
EUROCRYPT
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
4
-
-
0003808928
-
Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy
-
PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands
-
Brands, S. Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy. PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands, 1999.
-
(1999)
-
-
Brands, S.1
-
5
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press
-
Brickell, E., Camenisch, J., and Chen, L. Direct anonymous attestation. In ACM CCS '04, ACM Press, pp. 132-145.
-
ACM CCS '04
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
6
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
-
In of LNCS, Springer Verlag
-
Camenisch, J., and Damgård, I. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In ASIACRYPT 2000, vol. 1976 of LNCS, Springer Verlag, pp. 331-345.
-
(2000)
ASIACRYPT
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
7
-
-
0242500707
-
A signature scheme with efficient protocols
-
of LNCS, Springer Verlag
-
Camenisch, J., and Lysyanskaya, A. A signature scheme with efficient protocols. In Third Conference on Security in Communication Networks (2002), vol. 2576 of LNCS, Springer Verlag, pp. 274-295.
-
(2002)
Third Conference on Security in Communication Networks
, vol.2576
, pp. 274-295
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
In Springer Verlag
-
Camenisch, J., and Lysyanskaya, A. Signature schemes and anonymous credentials from bilinear maps. In CRYPT0 2004, Springer Verlag.
-
(2004)
CRYPT0
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
In of LNCS, Springer Verlag
-
Camenisch, J., and Michels, M. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS, Springer Verlag, pp. 107-122.
-
EUROCRYPT '99
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
10
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
In of LNCS, Springer Verlag
-
Camenisch, J., and Michels, M. Separability and efficiency for generic group signature schemes. In CRYPTO '99 (1999), vol. 1666 of LNCS, Springer Verlag, pp. 413-430.
-
(1999)
CRYPTO '99
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
11
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms
-
In LNCS
-
Camenisch, J., and Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO 2003, LNCS.
-
(2003)
CRYPTO
-
-
Camenisch, J.1
Shoup, V.2
-
12
-
-
33845539828
-
-
Tech. Rep. Research Report RZ 3646, IBM Zurich Research Laboratory
-
Camenisch, J., and Sommer, D. Tech. Rep. Research Report RZ 3646, IBM Zurich Research Laboratory, 2006.
-
(2006)
-
-
Camenisch, J.1
Sommer, D.2
-
13
-
-
33749000965
-
A general certification framework with applications to privacy-enhancing certificate infrastructures
-
Tech. Rep. 3629, IBM Zurich Research Laboratory, November
-
Camenisch, J., Sommer, D., and Zimmermann, R. A general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. 3629, IBM Zurich Research Laboratory, November 2005.
-
(2005)
-
-
Camenisch, J.1
Sommer, D.2
Zimmermann, R.3
-
14
-
-
0008317070
-
Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem
-
PhD thesis, ETH Zürich, 1998. Diss. ETH No. 12520, Hartung Gorre Verlag, Konstanz
-
Camenisch, J. L. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. PhD thesis, ETH Zürich, 1998. Diss. ETH No. 12520, Hartung Gorre Verlag, Konstanz.
-
-
-
Camenisch, J.L.1
-
15
-
-
84957661460
-
Easy come - Easy go divisible cash
-
In of LNCS, Springer Verlag
-
Chan, A, Frankel, Y., and Tsiounis, Y. Easy come - easy go divisible cash. In EUROCRYPT '98 (1998), vol. 1403 of LNCS, Springer Verlag, pp. 561-575.
-
(1998)
EUROCRYPT '98
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
16
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
(Feb.)
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (Feb. 1981), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
17
-
-
0003062028
-
Blind signature systems
-
In Plenum Press
-
Chaum, D. Blind signature systems. In CRYPTO '83, Plenum Press, p. 153.
-
CRYPTO '83
, pp. 153
-
-
Chaum, D.1
-
18
-
-
85001025766
-
Wallet databases with observers
-
In of LNCS, Springer-Verlag
-
Chaum, D., and Pedersen, T. P. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, Springer-Verlag, pp. 89-105.
-
CRYPTO '92
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
19
-
-
85024290278
-
Group signatures
-
In of LNCS, Springer-Verlag
-
Chaum, D., and van Heyst, E. Group signatures. In EUROCRYPT '91 (1991), vol. 547 of LNCS, Springer-Verlag, pp. 257-265.
-
(1991)
EUROCRYPT '91
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
20
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
In of LNCS, Springer Verlag
-
Cramer, R., Damgård, I., and Schoenmakers, B. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPT0 '94 (1994), vol. 839 of LNCS, Springer Verlag, pp. 174-187.
-
(1994)
CRYPT0 '94
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
21
-
-
23044520104
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
In of LNCS, Springer Verlag
-
Damgård, I. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
-
(2000)
EUROCRYPT
, vol.1807
, pp. 431-444
-
-
Damgård, I.1
-
22
-
-
23044533897
-
An integer commitment scheme based on groups with hidden order
-
In of LNCS, Springer
-
Damgård, I., and Fujisaki, E. An integer commitment scheme based on groups with hidden order. In ASAACRYPT 2002, vol. 2501 of LNCS, Springer.
-
(2002)
ASAACRYPT
, vol.2501
-
-
Damgård, I.1
Fujisaki, E.2
-
23
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
In of LNCS, Springer Verlag
-
Fiat, A., and Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, vol. 263 of LNCS, Springer Verlag, pp. 186-194.
-
CRYPTO '86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
24
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
In of LNCS, Springer Verlag
-
Fujisaki, E., and Okamoto, T. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, Springer Verlag, pp. 16-30.
-
CRYPTO '97
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
25
-
-
35048841283
-
Traceable signatures
-
In of LNCS, Springer
-
Kiayias, A., Tsiounis, Y., and Yung, M. Traceable signatures. In EUROCRYPT, vol. 3027 of LNCS, Springer, pp. 571-589.
-
EUROCRYPT
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
26
-
-
33845531277
-
Identity escrow
-
Theory of Cryptography Library, Record Nr. 97-11
-
Kilian, J., and Petrank, E. Identity escrow. Theory of Cryptography Library, Record Nr. 97-11, http://theory.lcs.mit.edu/~tcryptol,Aug. 1997.
-
(1997)
-
-
Kilian, J.1
Petrank, E.2
-
27
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
In of LNCS, Springer Verlag
-
Pedersen, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, Springer Verlag, pp. 129-140.
-
CRYPTO '91
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
33845541552
-
-
PRIME project
-
PRIME project. www.prime-project.eu.org.
-
-
-
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
(Feb.)
-
Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb. 1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
30
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, C. P. Efficient signature generation for smart cards. Journal of Cryptology 4, 3 (1991), 239-252.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
|