-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Advances in Cryptology - CRYPTO '00, Springer
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - CRYPTO '00, volume 1880 of LNCS, pages 255-270. Springer, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
0345490609
-
Efficient group signatures without trapdoors
-
Advances in Cryptology - ASIACRYPT '03, Springer
-
G. Ateniese and B. de Medeiros. Efficient group signatures without trapdoors. In Advances in Cryptology - ASIACRYPT '03, volume 2894 of LNCS, pages 246-268. Springer, 2002.
-
(2002)
LNCS
, vol.2894
, pp. 246-268
-
-
Ateniese, G.1
De Medeiros, B.2
-
3
-
-
84921023488
-
Some open issues and new directions in group signatures
-
Financial Cryptography (FC '99), Springer
-
G. Ateniese and G. Tsudik. Some open issues and new directions in group signatures. In Financial Cryptography (FC '99), volume 1648 of LNCS, pages 196-211. Springer, 1999.
-
(1999)
LNCS
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
4
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Advances in Cryptology - EUROCRYPT '97, Springer
-
N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT '97, volume 1233 of LNCS, pages 480-494. Springer, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 480-494
-
-
Barić, N.1
Pfitzmann, B.2
-
5
-
-
84945138489
-
Identification protocols secure against reset attacks
-
Advances in Cryptology-EUROCRYPT '01, Springer
-
M. Bellare, M. Fischlin, S. Goldwasser, and S. Micali. Identification protocols secure against reset attacks. In Advances in Cryptology-EUROCRYPT '01, volume 2045 of LNCS, pages 495-511. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 495-511
-
-
Bellare, M.1
Fischlin, M.2
Goldwasser, S.3
Micali, S.4
-
6
-
-
2642534257
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Springer
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology - EUROCRYPT '03, volume 2656, pages 630-648. Springer, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT '03
, vol.2656
, pp. 630-648
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
7
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Advances in Cryptology - EUROCRYPT '93, Springer
-
J. Benaloh and M. de Mare. One-way accumulators: a decentralized alternative to digital signatures. In Advances in Cryptology - EUROCRYPT '93, volume 765 of LNCS, pages 274-285. Springer, 1993.
-
(1993)
LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Advances in Cryptology - EUROCRYPT '03, Springer
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of LNCS, pages 416-432. Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
84948973732
-
Efficient proofs that a commited number lies in an interval
-
Advances in Cryptology - EUROCRYPT '00, Springer
-
F. Boudot. Efficient proofs that a commited number lies in an interval. In Advances in Cryptology - EUROCRYPT '00, volume 1807 of LNCS, pages 431-444. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
11
-
-
84937429196
-
Efficient revocation in group signatures
-
Public Key Cryptography (PKC '01), Springer
-
E. Bresson and J. Stern. Efficient revocation in group signatures. In Public Key Cryptography (PKC '01), volume 1992 of LNCS, pages 190-206. Springer, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
12
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
CRYPTO 2002, Springer
-
E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In CRYPTO 2002, volume 2442 of LNCS, pages 465-480. Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
13
-
-
84957354154
-
Efficient and generalized group signatures
-
Advances in Cryptology - EUROCRYPT '97, Springer
-
J. Camenisch. Efficient and generalized group signatures. In Advances in Cryptology - EUROCRYPT '97, volume 1233 of LNCS, pages 465-479. Springer, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
14
-
-
84880895254
-
An identity escrow scheme with appointed verifiers
-
Advances in Cryptology - CRYPTO '01, Springer
-
J. Camenisch and A. Lysyanskaya. An identity escrow scheme with appointed verifiers. In Advances in Cryptology - CRYPTO '01, volume 2139 of LNCS, pages 388-407. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 388-407
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
84937428748
-
Dynamic accumulators and applications to efficient revocation of anonymous credentials
-
Advances in Cryptology - CRYPTO '02, Springer
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and applications to efficient revocation of anonymous credentials. In Advances in Cryptology - CRYPTO '02, volume 2442 of LNCS, pages 61-76. Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
84947809553
-
A group signature scheme with improved efficiency
-
Advances in Cryptology - ASIACRYPT '98, Springer
-
J. Camenisch and M. Michels. A group signature scheme with improved efficiency. In Advances in Cryptology - ASIACRYPT '98, volume 1514 of LNCS, pages 160-174. Springer, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 160-174
-
-
Camenisch, J.1
Michels, M.2
-
17
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms. Full length version of extended abstract
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. Full length version of extended abstract in CRYPTO'03, available at: http://shoup.net/papers/, 2003.
-
(2003)
CRYPTO'03
-
-
Camenisch, J.1
Shoup, V.2
-
18
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology - CRYPTO '97, Springer
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 410-424. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
19
-
-
85024290278
-
Group signatures
-
Advances in Cryptology -EUROCRYPT '91, Springer
-
D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology -EUROCRYPT '91, volume 547 of LNCS, pages 257-265. Springer, 1991.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
20
-
-
84948980067
-
New group signature schemes (extended abstract)
-
Advances in Cryptology - EUROCRYPT 94, Springer
-
L. Chen and T. P. Pedersen. New group signature schemes (extended abstract). In Advances in Cryptology - EUROCRYPT 94, volume 950 of LNCS, pages 171-181. Springer, 1994.
-
(1994)
LNCS
, vol.950
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
22
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Advances in Cryptology - CRYPTO '94, Springer
-
R. Cramer, I. B. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - CRYPTO '94, volume 839 of LNCS, pages 174-187. Springer, 1994.
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.B.2
Schoenmakers, B.3
-
24
-
-
84958950087
-
On monotone formula closure of SZK
-
IEEE Computer Society Press
-
A. De Santis, G. Di Crescenzo, G. Persiano, and M. Yung. On monotone formula closure of SZK. In 35th Annual Symposium on Foundations of Computer Science, pages 454-465. IEEE Computer Society Press, 1994.
-
(1994)
35th Annual Symposium on Foundations of Computer Science
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
26
-
-
0024135240
-
Zero-knowledge proof of identity
-
U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proof of identity. Journal of Cryptology, 1(2):77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
27
-
-
84976826800
-
Zero knowledge proofs of knowledge in two rounds
-
Advances in Cryptology - CRYPTO '89, Springer
-
U. Feige and A. Shamir. Zero knowledge proofs of knowledge in two rounds. In Advances in Cryptology - CRYPTO '89, volume 435 of LNCS, pages 526-544. Springer, 1989.
-
(1989)
LNCS
, vol.435
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
28
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Advances in Cryptology - CRYPTO '86, Springer
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 186-194. Springer, 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
29
-
-
71149116146
-
Proof that yield nothing bur their validity or all languages in np have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proof that yield nothing bur their validity or all languages in np have zero-knowledge proof systems. Journal of the ACM, 38(3):691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
30
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
32
-
-
84957649548
-
Identity escrow
-
Advances in Cryptology - CRYPTO '98, Springer
-
J. Kilian and E. Petrank. Identity escrow. In Advances in Cryptology - CRYPTO '98, volume 1462 of LNCS, pages 169-185. Springer, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
33
-
-
79960836060
-
Deniable ring authentication
-
Advances in Cryptology - CRYPTO '02, Springer
-
M. Naor. Deniable ring authentication. In Advances in Cryptology - CRYPTO '02, volume 2442 of LNCS, pages 481-498. Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
34
-
-
84946833891
-
How to leak a secret
-
Advances in Cryptology - ASIACRYPT '01, Springer
-
R. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In Advances in Cryptology - ASIACRYPT '01, volume 2248 of LNCS, pages 552-565. Springer, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
35
-
-
0344628463
-
Accumulating composites and improved group signing
-
Advances in Cryptology - ASIACRYPT '03, Springer
-
G. Tsudik and S. Xu. Accumulating composites and improved group signing. In Advances in Cryptology - ASIACRYPT '03, volume 2894 of LNCS, pages 269-286. Springer, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 269-286
-
-
Tsudik, G.1
Xu, S.2
|