-
1
-
-
84946833891
-
How to leak a secret
-
Proc. ASIACRYPT 2001, Australia Springer-Verlag
-
Rivest R, Shamir A, Tauman Y. How to leak a secret. In Proc. ASIACRYPT 2001, Australia, Lecture Notes in Computer Science, 2248, Springer-Verlag, 2001, pp.552-565.
-
(2001)
Lecture Notes in Computer Science
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Proc. CRYPTO 2002, USA Springer-Verlag
-
Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In Proc. CRYPTO 2002, USA, Lecture Notes in Computer Science, 2442, Springer-Verlag, 2002, pp.465-480.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
3
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Proc. ASIACRYPT 2002, New Zealand Springer-Verlag
-
Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. In Proc. ASIACRYPT 2002, New Zealand, Lecture Notes in Computer Science, 2501, Springer-Verlag, 2002, pp.415-432.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
4
-
-
0142218983
-
On the RS-code construction of ring signature schemes and a threshold setting of RST
-
Proc. 5th Int. Conference on Information and Communication Security (ICICS 2003), China Springer-Verlag
-
Wong D S, Fung K, Liu J, Wei V. On the RS-code construction of ring signature schemes and a threshold setting of RST. In Proc. 5th Int. Conference on Information and Communication Security (ICICS 2003), China, Lecture Notes in Computer Science, 2836, Springer-Verlag, 2003, pp.34-46.
-
(2003)
Lecture Notes in Computer Science
, vol.2836
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.3
Wei, V.4
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proc. EUROCRYPT 2003, Poland Springer-Verlag
-
Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. EUROCRYPT 2003, Poland, Lecture Notes in Computer Science, 2656, Springer-Verlag, 2003, pp.416-432.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
35048854233
-
Anonymous identification in ad doc groups
-
Proc. EUROCRYPT 2004, Switzerland Springer-Verlag
-
Dodis Y, Kiayias A, Nicolosi A, Shoup V. Anonymous identification in ad doc groups. In Proc. EUROCRYPT 2004, Switzerland, LNCS 3027, Springer-Verlag, 2004, pp.609-626, Full version: http://www.cs.nyu.edu/ nicolo-si/papers/
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
7
-
-
24944466394
-
On the security models of (threshold) ring signature schemes
-
Proc. 7th Annual International Conference on Information Security and Cryptology (ICISC 2004), Korea Springer-Verlag
-
Liu J K, Wong D S. On the security models of (threshold) ring signature schemes. In Proc. 7th Annual International Conference on Information Security and Cryptology (ICISC 2004), Korea, Lecture Notes in Computer Science, 3506, Springer-Verlag 2005, pp.204-217.
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 204-217
-
-
Liu, J.K.1
Wong, D.S.2
-
8
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
Proc. Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, USA Springer
-
Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles. In Proc. Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, USA, Lecture Notes in Computer Science, 3876, Springer, 2006, pp.60-79, Full version: http://eprint.iacr.org/ 2005/304/.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Proc. CRYPTO 94, USA Springer-Verlag
-
Cramer R, Damgård I, Schoenmakers B. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proc. CRYPTO 94, USA, Lecture Notes in Computer Science, 839, Springer-Verlag, 1994, pp.174-187.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
10
-
-
84990731886
-
-
Proc. CRYPTO 86, USA Springer-Verlag
-
Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In Proc. CRYPTO 86, USA, LNCS 263, Springer-Verlag, 1987, pp.186-199.
-
(1987)
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
, vol.263
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
85024290278
-
Group signatures
-
Proc. EUROCRYPT '91, UK Springer
-
Chaum D, Eugène van Heyst. Group signatures. In Proc. EUROCRYPT '91, UK, LNCS 547, Springer, 1991, pp.257-265.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
12
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Proc. CRYPTO 97, USA Springer-Verlag
-
Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Proc. CRYPTO 97, USA, LNCS 1294, Springer-Verlag, 1997, pp.410-424.
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Proc. EUROCRYPT 2003, Poland Springer
-
Bellare M, Micciancio D, Warinschi B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proc. EUROCRYPT 2003, Poland, LNCS 2656, Springer, 2003, pp.614-629.
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
15
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups
-
Proc. ACISP 04, Australia Springer-Verlag
-
Liu J K, Wei V K, Wong D S. Linkable spontaneous anonymous group signature for ad hoc groups. In Proc. ACISP 04, Australia, LNCS 3108, Springer-Verlag, 2004, pp.325-335.
-
(2004)
LNCS
, vol.3108
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
16
-
-
33845535348
-
Enhanced security models and a generic construction approach for linkable ring signature
-
6
-
Liu J K, Wong D S. Enhanced security models and a generic construction approach for linkable ring signature. International Journal of Foundations of Computer Science, Dec. 2006, 17(6): 1403-1422.
-
(2006)
International Journal of Foundations of Computer Science
, vol.17
, pp. 1403-1422
-
-
Liu, J.K.1
Wong, D.S.2
-
17
-
-
33745675937
-
Toward the fair anonymous signatures: Deniable ring signatures
-
Proc. CT-RSA 2006, USA Springer-Verlag
-
Komano Y, Ohta K, Shimbo A, Kawamura S. Toward the fair anonymous signatures: Deniable ring signatures. In Proc. CT-RSA 2006, USA, LNCS 3860, Springer-Verlag, 2006, pp.174-191.
-
(2006)
LNCS
, vol.3860
, pp. 174-191
-
-
Komano, Y.1
Ohta, K.2
Shimbo, A.3
Kawamura, S.4
-
18
-
-
84947237328
-
On the security of joint signature and encryption
-
Proc. EUROCRYPT 02, The Netherlands Springer-Verlag
-
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In Proc. EUROCRYPT 02, The Netherlands, LNCS 2332, Springer-Verlag, 2002, pp.83-107.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
2
-
Goldwasser S, Micali S, Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 1998, 17(2): 281-308.
-
(1998)
SIAM J. Comput.
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
20
-
-
35048889048
-
A separable threshold ring signature scheme
-
Proc. ICISC 2003, Korea Springer-Verlag
-
Liu J K, Wei V K, Wong D S. A separable threshold ring signature scheme. In Proc. ICISC 2003, Korea, LNCS 2971, Springer-Verlag, 2004, pp.12-26.
-
(2004)
LNCS
, vol.2971
, pp. 12-26
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
21
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Proc. INDOCRYPT 2004, India Springer-Verlag
-
Patrick P Tsang, Victor K Wei, Tony K Chan, Man Ho Au, Joseph K Liu, Duncan S Wong. Separable linkable threshold ring signatures. In Proc. INDOCRYPT 2004, India, LNCS 3348, Springer-Verlag, 2004, pp.384-398.
-
(2004)
LNCS
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Ho Au, M.4
Liu, J.K.5
Wong, D.S.6
-
22
-
-
24644461219
-
Short linkable ring signatures for e-voting, e-cash and attestation
-
Proc. ISPEC 2005, Singapore Springer-Verlag
-
Patrick P Tsang, Victor K Wei. Short linkable ring signatures for e-voting, e-cash and attestation. In Proc. ISPEC 2005, Singapore, LNCS 3439, Springer-Verlag, 2005, pp.48-60.
-
(2005)
LNCS
, vol.3439
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
23
-
-
33845276753
-
Ad hoc group signatures
-
Proc. First International Workshop on Security (IWSEC 2006), Japan Springer-Verlag
-
Wu Q, Susilo W, Mu Y, Zhang F. Ad hoc group signatures. In Proc. First International Workshop on Security (IWSEC 2006), Japan, LNCS 4266, Springer-Verlag, 2006, pp.120-135.
-
(2006)
LNCS
, vol.4266
, pp. 120-135
-
-
Wu, Q.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
24
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. CRYPTO 2001, USA
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 2001, USA, LNCS 2139, 2001, pp.213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
26
-
-
85001025766
-
Wallet databases with observers
-
Proc. CRYPTO 92, USA Springer-Verlag
-
Chaum D, Pedersen T. Wallet databases with observers. In Proc. CRYPTO 92, USA, LNCS 740, Springer-Verlag, 1993, pp.89-105.
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
|