-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - CRYPTO '00, pages 255-270, 2000.
-
(2000)
Advances in Cryptology - CRYPTO '00
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT '97, pages 480-494, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
4
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
J. C. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in Cryptology - EUROCRYPT '93, pages 274-285, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT '93
, pp. 274-285
-
-
Benaloh, J.C.1
de Mare, M.2
-
6
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
May
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology - EUROCRYPT '00, pages 431-444, May 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT '00
, pp. 431-444
-
-
Boudot, F.1
-
9
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology - EUROCRYPT '01, pages 93-118, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT '01
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology - CRYPTO '02, pages 61-76, 2002.
-
(2002)
Advances in Cryptology - CRYPTO '02
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
0011390710
-
Proving in zero-knowledge that a number is the product of two safe primes
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In In Advances in Cryptology - EUROCRYPT '99, pages 106-121, 1999.
-
(1999)
In Advances in Cryptology - EUROCRYPT '99
, pp. 106-121
-
-
Camenisch, J.1
Michels, M.2
-
13
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In In Advances in Cryptology - CRYPTO '99, pages 413-430, 1999.
-
(1999)
In Advances in Cryptology - CRYPTO '99
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
17
-
-
84958774556
-
-
I. Damgård and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology: ASIACRYPT '02, pages 125-142. Springer, 2002.
-
I. Damgård and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In Advances in Cryptology: ASIACRYPT '02, pages 125-142. Springer, 2002.
-
-
-
-
18
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Aug
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology - CRYPTO '97, pages 16-30, Aug. 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
19
-
-
84957661041
-
-
R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - EUROCRYPT '99, pages 123-139, 1999.
-
R. Gennaro, S. Halevi, and T. Rabin. Secure hash-and-sign signatures without the random oracle. In Advances in Cryptology - EUROCRYPT '99, pages 123-139, 1999.
-
-
-
-
21
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In Selected Areas in Cryptography, 6th Annual International Workshop, SAC '99, pages 184-199, 1999.
-
(1999)
Selected Areas in Cryptography, 6th Annual International Workshop, SAC '99
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
22
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology - CRYPTO '91, pages 129-140, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91
, pp. 129-140
-
-
Pedersen, T.P.1
-
23
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Feb
-
A. Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1(1):38, Feb. 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.1
, pp. 38
-
-
Shamir, A.1
|