-
1
-
-
36549001029
-
Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive
-
Report 2005/385
-
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005/385, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Ateniese, G.1
Camenisch, J.2
Hohenberger, S.3
de, B.4
-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Proceedings of Crypto 2000, of, Springer-Verlag
-
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of Crypto 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-70. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
84921023488
-
Some open issues and directions in group signatures
-
Proceedings of Financial Cryptography 1999, of, Springer-Verlag
-
Giuseppe Ateniese and Gene Tsudik. Some open issues and directions in group signatures. In Proceedings of Financial Cryptography 1999, volume 1648 of Lecture Notes in Computer Science, pages 196-211. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
5
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Advances in Cryptology, EUROCRYPT 2003, of, Springer-Verlag
-
Mihir Bellare, Daniele Micciancio, and Bogdan Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-29. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Proceedings of CT-RSA 2005, Springer-Verlag
-
Mihir Bellare, Haixia Shi, and Chong Zhang. Foundations of group signatures: The case of dynamic groups. In Proceedings of CT-RSA 2005, Lecture Notes in Computer Science, pages 136-153. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
7
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Advances in Cryptology-EUROCRYPT 2004, of, Springer-Verlag
-
Dan Boneh and Xavier Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 223-38. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
35048848152
-
Short signatures without random oracles
-
Advances in Cryptology-EUROCRYPT 2004, of, Springer-Verlag
-
Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 56-73. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology-CRYPTO 2004, of, Springer-Verlag
-
Dan Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Advances in Cryptology-CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
10
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Proceedings of TCC 2005, Springer-Verlag
-
Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of TCC 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
11
-
-
14844309671
-
Group signatures with verifier-local revocation
-
ACM Press
-
Dan Boneh and Hovav Shacham. Group signatures with verifier-local revocation. In Proceedings of ACM CCS 2004, pages 168-77. ACM Press, 2004.
-
(2004)
Proceedings of ACM CCS 2004
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
12
-
-
38049078468
-
Cryptology ePrint Archive
-
Compact group signatures without random oracles, Report 2005/381
-
Xavier Boyen and Brent Waters. Compact group signatures without random oracles. Cryptology ePrint Archive, Report 2005/381, 2005. http ://eprint.iacr.org/.
-
(2005)
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
33746042155
-
Compact group signatures without random oracles
-
Advances in Cryptology-EUROCRYPT 2006, of, Springer-Verlag
-
Xavier Boyen and Brent Waters. Compact group signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 427-444. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
14
-
-
84957354154
-
Efficient and generalized group signatures
-
Advances in Cryptology -EUROCRYPT 1997, Springer-Verlag
-
Jan Camenisch. Efficient and generalized group signatures. In Advances in Cryptology -EUROCRYPT 1997, Lecture Notes in Computer Science, pages 465-479. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, pp. 465-479
-
-
Camenisch, J.1
-
15
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspects
-
Jan Camenisch and Jens Groth. Group signatures: Better efficiency and new theoretical aspects. In Proceedings of SCN 2004, pages 120-133, 2004.
-
(2004)
Proceedings of SCN 2004
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
16
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Advances in Cryptology, CRYPTO 2002, of, Springer-Verlag
-
Jan Camenisch and Anna Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 61-76. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Advances in Cryptology-CRYPTO 2004, of, Springer-Verlag
-
Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology-CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
85024290278
-
Group signatures
-
Advances in Cryptology-EUROCRYPT 1991, of, Springer-Verlag
-
David Chaum and Eugène van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 1991, volume 547 of Lecture Notes in Computer Science, pages 257-65. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
20
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
Danny Dolev, Cynthia Dwork, and Moni Naor. Non-malleable cryptography (extended abstract). In Proceedings of STOC 1991, pages 542-552, 1991.
-
(1991)
Proceedings of STOC 1991
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
21
-
-
77649262306
-
Simulation-sound NIZK proofs for a practical language and constant size group signatures
-
Proceedings of ASIACRYPT 2006, Springer-Verlag
-
Jens Groth. Simulation-sound NIZK proofs for a practical language and constant size group signatures. In Proceedings of ASIACRYPT 2006, Lecture Notes in Computer Science, pages 444-459. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, pp. 444-459
-
-
Groth, J.1
-
22
-
-
33749544769
-
Non-interactive Zaps and new techniques for NIZK
-
Advances in Cryptology, CRYPTO 2006, Springer-Verlag
-
Jens Groth, Rafail Ostrovsky, and Amit Sahai. Non-interactive Zaps and new techniques for NIZK. In Advances in Cryptology - CRYPTO 2006, Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
23
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Advances in Cryptology-EUROCRYPT 2006, Springer-Verlag
-
Jens Groth, Rafail Ostrovsky, and Amit Sahai. Perfect non-interactive zero knowledge for NP. In Advances in Cryptology-EUROCRYPT 2006, Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
24
-
-
21144454271
-
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
-
Antoine Joux and Kim Nguyen. Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Journal of Cryptology, 16(4), 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
-
-
Joux, A.1
Nguyen, K.2
-
25
-
-
35248872023
-
Extracting group signatures from traitor tracing schemes
-
Advances in Cryptology-EUROCRYPT 2008, Springer-Verlag
-
Aggelos Kiayias and Moti Yung. Extracting group signatures from traitor tracing schemes. In Advances in Cryptology-EUROCRYPT 2008, Lecture Notes in Computer Science, pages 630-48. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, pp. 630-648
-
-
Kiayias, A.1
Yung, M.2
-
26
-
-
29244453439
-
Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive
-
Group signatures:, Report 2004/076
-
Aggelos Kiayias and Moti Yung. Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/.
-
(2004)
-
-
Kiayias, A.1
Yung, M.2
-
27
-
-
24944524118
-
Group signatures with efficient concurrent join
-
Advances in Cryptology-EUROCRYPT 2005, Springer-Verlag
-
Aggelos Kiayias and Moti Yung. Group signatures with efficient concurrent join. In Advances in Cryptology-EUROCRYPT 2005, Lecture Notes in Computer Science, pages 198-214. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
28
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Advances in Cryptology-CRYPTO 2003, Springer-Verlag
-
Moni Naor. On cryptographic assumptions and challenges. In Advances in Cryptology-CRYPTO 2003, Lecture Notes in Computer Science, pages 96-109. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, pp. 96-109
-
-
Naor, M.1
|