-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO, vol. 1880, p. 255-270, 2000.
-
(2000)
CRYPTO
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
85180411878
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In NDSS, p. 29-13, 2005.
-
(2005)
NDSS
, pp. 29-13
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
34547375847
-
-
L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-Resistant Storage. Johns Hopkins University, Technical Report # TR-SP-BGMM-050705, 2005.
-
L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-Resistant Storage. Johns Hopkins University, Technical Report # TR-SP-BGMM-050705, 2005.
-
-
-
-
4
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In EUROCRYPT '97, volume 1233, p. 480-194, 1997.
-
(1997)
EUROCRYPT '97
, vol.1233
, pp. 480-194
-
-
Baric, N.1
Pfitzmann, B.2
-
5
-
-
35048848152
-
Short signatures without random oracles
-
EUROCRYPT, v. of
-
D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT, v.3027 of LNCS, p. 56-73, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
35048887476
-
Short group signatures using strong DifHe-Hellman
-
CRYPTO, of
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures using strong DifHe-Hellman. In CRYPTO, volume 3152 of LNCS, p. 41-55, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, v.2139, p. 213-229, 2001.
-
(2001)
CRYPTO
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT, vol. 1807, p. 431-144, 2000.
-
(2000)
EUROCRYPT
, vol.1807
, pp. 431-144
-
-
Boudot, F.1
-
10
-
-
84995460223
-
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
-
E. Brickell, P. Gemmel, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In SIAM, p. 457-166, 1995.
-
(1995)
SIAM
, pp. 457-166
-
-
Brickell, E.1
Gemmel, P.2
Kravitz, D.3
-
11
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
-
ASIACRYPT, of
-
J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In ASIACRYPT, volume 1976 of LNCS, p. 331-345, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
12
-
-
24944435537
-
Compact E-Cash
-
EUROCRYPT, of
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact E-Cash. In EUROCRYPT, volume 3494 of LNCS, p. 302-321, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
13
-
-
33750024803
-
Balancing accountability and privacy using e-cash
-
to appear
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Balancing accountability and privacy using e-cash. In SCN (to appear), 2006.
-
(2006)
In SCN
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
14
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
EUROCRYPT, of
-
J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT, volume 2045 of LNCS, p. 93-118, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
84937428748
-
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2442 of LNCS, p. 61-76, 2002.
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2442 of LNCS, p. 61-76, 2002.
-
-
-
-
16
-
-
35248839965
-
A signature scheme with efficient protocols
-
SCN 2002, of
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, volume 2576 of LNCS, p. 268-289, 2003.
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
CRYPTO 2004, of
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, volume 3152 of LNCS, p. 56-72, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
84949745296
-
Digital payment systems with passive anonymity-revoking trustees
-
ESORICS 96, of
-
J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In ESORICS 96, volume 1146 of LNCS, p. 33-13, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 33-13
-
-
Camenisch, J.1
Maurer, U.2
Stadler, M.3
-
19
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, volume 1592, p. 107-122, 1999.
-
(1999)
EUROCRYPT '99
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
20
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
CRYPTO '99, of
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In CRYPTO '99, volume 1666 of LNCS, p. 413-430, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
21
-
-
84958612917
-
Efficient group signature schemes for large groups
-
CRYPTO '97, of
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO '97, volume 1296 of LNCS, p. 410-124, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-124
-
-
Camenisch, J.1
Stadler, M.2
-
22
-
-
84957661460
-
Easy come - easy go divisible cash
-
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In EUROCRYPT, v. 1403, p. 561-575, 1998.
-
(1998)
EUROCRYPT
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
23
-
-
0001604533
-
Blind signatures for untraceable payments
-
Plenum Press
-
D. Chaum. Blind signatures for untraceable payments. In CRYPTO '82, p. 199-203. Plenum Press, 1982.
-
(1982)
CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
24
-
-
0003062028
-
Blind signature systems
-
Plenum
-
D. Chaum. Blind signature systems. In CRYPTO '83, p. 153-156. Plenum, 1983.
-
(1983)
CRYPTO '83
, pp. 153-156
-
-
Chaum, D.1
-
25
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct. 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
26
-
-
84929273746
-
Untraceable electronic cash
-
CRYPTO, of
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO, volume 403 of LNCS, p. 319-327, 1990.
-
(1990)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
27
-
-
85024290278
-
Group signatures
-
EUROCRYPT '91, of
-
D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT '91, volume 547 of LNCS, p. 257-265, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
28
-
-
24144487020
-
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, 3378 of LNCS, p. 363-385, 2005.
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, volume 3378 of LNCS, p. 363-385, 2005.
-
-
-
-
29
-
-
33746048789
-
Unclonable group identification
-
EUROCRYPT, of
-
I. Damgard, K. Dupont, and M. O. Pedersen. Unclonable group identification. In EUROCRYPT, volume 4004 of LNCS, p. 555-572, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 555-572
-
-
Damgard, I.1
Dupont, K.2
Pedersen, M.O.3
-
30
-
-
85031802442
-
Payment systems and credential mechanism with provable security against abuse by individuals
-
CRYPTO, of
-
I. B. Damgård. Payment systems and credential mechanism with provable security against abuse by individuals. In CRYPTO, volume 403 of LNCS, p. 328-335, 1990.
-
(1990)
LNCS
, vol.403
, pp. 328-335
-
-
Damgård, I.B.1
-
31
-
-
84958742006
-
Efficient construction of (distributed) verifiable random functions
-
Y. Dodis. Efficient construction of (distributed) verifiable random functions. In PKC, volume 2567, p. 1-17, 2003.
-
(2003)
PKC
, vol.2567
, pp. 1-17
-
-
Dodis, Y.1
-
32
-
-
24144481228
-
-
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs an Keys. In PKC, 3386 of LNCS, p. 416-431, 2005.
-
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs an Keys. In PKC, volume 3386 of LNCS, p. 416-431, 2005.
-
-
-
-
33
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
CRYPTO, of
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO, volume 263 of LNCS, p. 186-194, 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
34
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
CRYPTO '97, of
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, volume 1294 of LNCS, p. 16-30, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
35
-
-
84946832010
-
Supersingular curves in cryptography
-
ASIACRYPT, of
-
S. D. Galbraith. Supersingular curves in cryptography. In ASIACRYPT, volume 2248 of LNCS, p. 495-513, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 495-513
-
-
Galbraith, S.D.1
-
36
-
-
35048900318
-
Handcuffing big brother: An abuse-resilient transaction escrow scheme
-
EUROCRYPT, of
-
S. Jarecki and V. Shmatikov. Handcuffing big brother: an abuse-resilient transaction escrow scheme. In EUROCRYPT, volume 3027 of LNCS, p. 590-608, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 590-608
-
-
Jarecki, S.1
Shmatikov, V.2
-
37
-
-
35048841283
-
Traceable signatures
-
A. Kiayias, M. Yung, and Y. Tsiounis. Traceable signatures. In EUROCRYPT, vol. 3027, p. 571-589, 2004.
-
(2004)
EUROCRYPT
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Yung, M.2
Tsiounis, Y.3
-
39
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In SAC, vol. 1758, p. 184-199, 1999.
-
(1999)
SAC
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
40
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
CT-RSA, of
-
N. McCullagh and P. S. L. M. Barreto. A new two-party identity-based authenticated key agreement. In CT-RSA, volume 3376 of LNCS, p. 262-274, 2004.
-
(2004)
LNCS
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
41
-
-
0010227312
-
Complexity of a determinate algorithm for the discrete log
-
V. I. Nechaev. Complexity of a determinate algorithm for the discrete log. Mathematical Notes, 55:165-172, 1994.
-
(1994)
Mathematical Notes
, vol.55
, pp. 165-172
-
-
Nechaev, V.I.1
-
42
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
ACNS, in
-
L. Nguyen and R. Safavi-Naini. Dynamic k-times anonymous authentication. In ACNS, volume 3531 in LNCS, p. 318-333, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
43
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO, of
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO, volume 576 of LNCS, p. 129-140, 1992.
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
45
-
-
84942550160
-
-
V. Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, LNCS, p. 256-266, 1997. Update: http://www.shoup.net/papers/.
-
V. Shoup. Lower bounds for discrete logarithms and related problems. In EUROCRYPT, LNCS, p. 256-266, 1997. Update: http://www.shoup.net/papers/.
-
-
-
-
47
-
-
35048839792
-
k-times anonymous authentication (extended abstract)
-
Asiacrypt, of
-
I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In Asiacrypt, volume 3329 of LNCS, p. 308-322, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
|