-
1
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Advances in Cryptology, Eurocrypt 2000, of, Springer Verlag
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 431-444. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
2
-
-
84948967686
-
Confirmer signature schemes secure against adaptive adversaries
-
Advances in Cryptology, Eurocrypt 2000, Springer Verlag
-
J. Camenisch and Markus Michels. Confirmer signature schemes secure against adaptive adversaries. In Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science, pages 243-258. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, pp. 243-258
-
-
Camenisch, J.1
Michels, M.2
-
3
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Advances in Cryptology, Crypto 2003, of, Springer Verlag
-
J. Camensisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology - Crypto 2003, volume 2729 of Lecture Notes in Computer Science, pages 126-144. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 126-144
-
-
Camensisch, J.1
Shoup, V.2
-
4
-
-
84948970342
-
Designated confirmer signatures
-
Advances in Cryptology, Eurocrypt '94, of, Springer Verlag
-
D. Chaum. Designated confirmer signatures. In Advances in Cryptology - Eurocrypt '94, volume 950 of Lecture Notes in Computer Science, pages 86-91. Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 86-91
-
-
Chaum, D.1
-
5
-
-
0010252194
-
Undeniable signatures
-
Advances in Cryptology, Crypto '89, of, Springer Verlag
-
D. Chaum and H. van Antwerpen. Undeniable signatures. In Advances in Cryptology - Crypto '89, volume 435 of Lecture Notes in Computer Science, pages 212-216. Springer Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 212-216
-
-
Chaum, D.1
van Antwerpen, H.2
-
6
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
Springer Verlag
-
R. Cramer, I. Damgård, and P. D. MacKenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In Public Key Cryptography - PKC 2000, volume 1751, pages 354-372. Springer Verlag, 2000.
-
(2000)
Public Key Cryptography - PKC 2000
, vol.1751
, pp. 354-372
-
-
Cramer, R.1
Damgård, I.2
MacKenzie, P.D.3
-
7
-
-
84979008595
-
Efficient and provable security amplifications
-
Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings, of, Springer
-
R Cramer, I. Damgård, and T. P. Pedersen. Efficient and provable security amplifications. In Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings, volume 1189 of Lecture Notes in Computer Science, pages 101-109. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1189
, pp. 101-109
-
-
Cramer, R.1
Damgård, I.2
Pedersen, T.P.3
-
9
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
Advances in Cryptology, Asiacrypt 2002, of, Springer Verlag
-
I. Damgård and E. Fujisaki. A statistically-hiding integer commitment scheme based on groups with hidden order. In Advances in Cryptology - Asiacrypt 2002, volume 2501 of Lecture Notes in Computer Science, pages 125-142. Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 125-142
-
-
Damgård, I.1
Fujisaki, E.2
-
12
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Advances in Cryptology, Crypto '97, of, Springer Verlag
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology - Crypto '97, volume 1294 of Lecture Notes in Computer Science, pages 16-30. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
33646814398
-
Efficient designated confirmer signatures without random oracles or zero-knowledge proofs (extended abstract)
-
Advances in Cryptology, Asiacrypt 2005, of, Springer Verlag
-
C. Gentry, D. Molnar, and Z. Ramzan. Efficient designated confirmer signatures without random oracles or zero-knowledge proofs (extended abstract). In Advances in Cryptology - Asiacrypt 2005, volume 3788 of Lecture Notes in Computer Science, pages 662-681. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 662-681
-
-
Gentry, C.1
Molnar, D.2
Ramzan, Z.3
-
14
-
-
0027306732
-
A uniform-complexity treatment of encryption and zeroknowledge
-
O. Goldreich. A uniform-complexity treatment of encryption and zeroknowledge. Journal of Cryptology, 6(1):21-53, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
16
-
-
33645958098
-
Transformation of digital signature schemes into designated confirmer signatures
-
1st Theory of Cryptography Conference TCC, of, Springer Verlag
-
S. Goldwasser and E. Waisbard. Transformation of digital signature schemes into designated confirmer signatures. In 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 77-100. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 77-100
-
-
Goldwasser, S.1
Waisbard, E.2
-
17
-
-
84927752554
-
Designated verifier proofs and their applications
-
Advances in Cryptology, Eurocrypt '96, of, Springer Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Advances in Cryptology - Eurocrypt '96, volume 1070 of Lecture Notes in Computer Science, pages 143-154. Springer Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
18
-
-
84957668474
-
Generic constructions for secure and efficient confirmer signature schemes
-
Advances in Cryptology, Eurocrypt 1998, of, Springer Verlag
-
M. Michels and M. Stadler. Generic constructions for secure and efficient confirmer signature schemes. In Advances in Cryptology - Eurocrypt 1998, volume 1403 of Lecture Notes in Computer Science, pages 406-421. Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 406-421
-
-
Michels, M.1
Stadler, M.2
-
19
-
-
84979016283
-
Designated confirmer signatures and public key encryption are equivalent
-
Advances in Cryptology, Crypto '94, of, Springer Verlag
-
T. Okamoto. Designated confirmer signatures and public key encryption are equivalent. In Advances in Cryptology - Crypto '94, volume 839 of Lecture Notes in Computer Science, pages 61-74. Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 61-74
-
-
Okamoto, T.1
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology, Eurocrypt '99, of, Springer Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
34848838622
-
New and improved constructions of non-malleable cryptographic protocols
-
ACM Press
-
R. Pass and A. Rosen. New and improved constructions of non-malleable cryptographic protocols. In 37th ACM Symposium on the Theory of Computing (STOC), pages 533-542. ACM Press, 2005.
-
(2005)
37th ACM Symposium on the Theory of Computing (STOC)
, pp. 533-542
-
-
Pass, R.1
Rosen, A.2
-
22
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Advances in Cryptology, Eurocrypt '98, of, Springer Verlag
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. In Advances in Cryptology - Eurocrypt '98, volume 1403 of Lecture Notes in Computer Science, pages 1-16. Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
23
-
-
38049068478
-
Designated confirmer signatures revisited. Cryptology ePrint Archive
-
Report 2006/123
-
Douglas Wikström. Designated confirmer signatures revisited. Cryptology ePrint Archive, Report 2006/123, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Wikström, D.1
|