-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Advances in Cryptology, CRYPTO '00, of, Springer Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - CRYPTO '00, volume 1880 of LNCS, pages 255-270. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
Secure Internet Programming, Security Issues for Distributed and Mobile Objects, of, Springer
-
T. Aura. Distributed access-rights management with delegation certificates. In Secure Internet Programming - Security Issues for Distributed and Mobile Objects, volume 1603 of LNCS, pages 211-235. Springer, 1999.
-
(1999)
LNCS
, vol.1603
, pp. 211-235
-
-
Aura, T.1
-
4
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE Press
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H. Wong. Secret handshakes from pairing-based key agreements. In 2005 IEEE Symposium on Security and Privacy, pages 180-196. IEEE Press, 2003.
-
(2003)
2005 IEEE Symposium on Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.6
-
5
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in Cryptology, Crypto '02, of, Springer-Verlag
-
P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology - Crypto '02, volume 2442 of LNCS, pages 354-368. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
7
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology, Crypto '04
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Advances in Cryptology - Crypto '04, LNCS, 2004.
-
(2004)
LNCS
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology, Crypto '01, of, Springer-Verlag
-
D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology - Crypto '01, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology - Eurocrypt '03, pages 416-432, 2003.
-
(2003)
Advances in Cryptology - Eurocrypt '03
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology, Asiacrypt '01, of, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology - Asiacrypt '01, volume 2248 of LNCS, pages 514-532. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
12
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Advances in Cryptology, Crypto '02, of
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology - Crypto '02, volume 2442 of LNCS, pages 61-76, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology, CRYPTO '97, of, Springer-Verlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology - CRYPTO '97, volume 1296 of LNCS, pages 410-424. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
15
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
October
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, October 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
January
-
D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Proceedings of Advances in Cryptology - CRYPTO '86, pages 118-167, January 1987.
-
(1987)
Proceedings of Advances in Cryptology - CRYPTO '86
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
18
-
-
25844435663
-
A new ID-based group signature scheme from bilinear pairings
-
K. Chae and M. Yung, editors, Proceedings of International Workshop on Information Security Applications (WISA) 2003, of, Springer, August
-
X. Chen, F. Zhang, and K. Kim. A new ID-based group signature scheme from bilinear pairings. In K. Chae and M. Yung, editors, Proceedings of International Workshop on Information Security Applications (WISA) 2003, volume 2908 of LNCS, pages 585-592. Springer, August 2003.
-
(2003)
LNCS
, vol.2908
, pp. 585-592
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
19
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
20
-
-
33845627254
-
Trustee tokens: Simple and practical tracing of anonymous digital cash
-
Financial Cryptography '99, of, Springer-Verlag
-
A. Juels. Trustee tokens: Simple and practical tracing of anonymous digital cash. In Financial Cryptography '99, volume 1648 of LNCS, pages 33-43. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1648
, pp. 33-43
-
-
Juels, A.1
-
22
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
23
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
Advances in Cryptology, Eurocrypt '04, of, Springer-Verlag
-
A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham. Sequential aggregate signatures from trapdoor permutations. In Advances in Cryptology - Eurocrypt '04, volume 3027 of LNCS, pages 74-90. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
24
-
-
35048876720
-
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings
-
Advances in Cryptology, Asiacrypt '04, of, Springer
-
L. Nguyen and R. Safavi-Naini. Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In Advances in Cryptology - Asiacrypt '04, volume 3329 of LNCS, pages 372-386. Springer, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 372-386
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
25
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
PKC '01, of, Springer-Verlag
-
T. Okamoto and D. Pointcheval. The gap-problems: a new class of problems for the security of cryptographic schemes. In PKC '01, volume 1992 of LNCS, pages 104-118. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
27
-
-
33845929453
-
Cascaded authorization with anonymous-signer aggregate signatures
-
April
-
D. Yao and R. Tamassia. Cascaded authorization with anonymous-signer aggregate signatures. Brown University Technical Report. April 2006. http://www.cs.brown.edu/people/dyao/anonymity-full.pdf.
-
(2006)
Brown University Technical Report
-
-
Yao, D.1
Tamassia, R.2
|