-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
W. Aiello, Y. Ishai, and O. Reingold. : Priced oblivious transfer: How to sell digital goods. In EUROCRYPT 2001, p. 119-135.
-
EUROCRYPT 2001
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
33745648522
-
On the (im)possibility of blind message authentication codes
-
M. Abdalla, C. Namprempre, and G. Neven. On the (im)possibility of blind message authentication codes. In CT-RSA 2006, p. 262-279.
-
(2006)
CT-RSA
, pp. 262-279
-
-
Abdalla, M.1
Namprempre, C.2
Neven, G.3
-
3
-
-
35048848152
-
Short signatures without random oracles
-
D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT 2004, p. 56-73.
-
EUROCRYPT 2004
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
84983104598
-
On defining proofs of knowledge
-
M. Bellare and O. Goldreich. On defining proofs of knowledge. In CRYPTO'92, p. 390-420.
-
CRYPTO'92
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
6
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO'89, p. 547-557.
-
CRYPTO'89
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
7
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. J. Cryptology, 16(3):185-215, 2003.
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
8
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme
-
A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In PKC 2003, p. 31-46.
-
PKC 2003
, pp. 31-46
-
-
Boldyreva, A.1
-
9
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, p. 62-73.
-
ACM CCS
, vol.93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and composition of multi-party cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
11
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
R. Cramer, I. Damgård, and P. MacKenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In PKC 2000, p. 354-372.
-
PKC 2000
, pp. 354-372
-
-
Cramer, R.1
Damgård, I.2
MacKenzie, P.3
-
12
-
-
38049128453
-
Blind signature systems
-
U.S. Patent #4,759,063
-
D. Chaum. Blind signature systems. U.S. Patent #4,759,063, 1988.
-
(1988)
-
-
Chaum, D.1
-
13
-
-
85012928152
-
Weakening security assumptions and oblivious transfer
-
C. Crépeau and J. Kilian. Weakening security assumptions and oblivious transfer. In CRYPTO'88, p. 2-7.
-
CRYPTO'88
, pp. 2-7
-
-
Crépeau, C.1
Kilian, J.2
-
14
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, p. 56-72.
-
CRYPTO 2004
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
33846879363
-
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication. To appear in J
-
D. Catalano, D. Pointcheval, and T. Pornin. Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication. To appear in J. Cryptology, 2007.
-
(2007)
Cryptology
-
-
Catalano, D.1
Pointcheval, D.2
Pornin, T.3
-
17
-
-
84958612917
-
Efficient group signature schemes for large groups
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO'97, p. 410-424.
-
CRYPTO'97
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
18
-
-
24144485861
-
Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
-
C.-K. Chu and W.-G. Tzeng. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In PKC 2005, p. 172-183.
-
PKC 2005
, pp. 172-183
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
19
-
-
20444446289
-
Concurrent zero-knowledge
-
C. Dwork, M. Naor, and A. Sahai. Concurrent zero-knowledge. J. ACM, 51(6):851-898, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.6
, pp. 851-898
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
20
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Y. Dodis and A. Yampolskiy. A verifiable random function with short proofs and keys. In PKC 2005, p. 416-431.
-
PKC 2005
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
21
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
22
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
24
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In 19th ACM STOC, p. 218-229.
-
19th ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
85008172715
-
Invariant signatures and non-interactive zero-knowledge proofs are equivalent
-
S. Goldwasser and R. Ostrovsky. Invariant signatures and non-interactive zero-knowledge proofs are equivalent. In CRYPTO'92, p. 228-245.
-
CRYPTO'92
, pp. 228-245
-
-
Goldwasser, S.1
Ostrovsky, R.2
-
26
-
-
84958591696
-
Security of blind digital signatures (Extended abstract)
-
A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures (Extended abstract). In CRYPTO'97, p. 150-164.
-
CRYPTO'97
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
27
-
-
24944473997
-
Smooth projective hashing and two-message oblivious transfer
-
Y. Kalai. Smooth projective hashing and two-message oblivious transfer. In EUROCRYPT 2005, p. 78-95.
-
EUROCRYPT 2005
, pp. 78-95
-
-
Kalai, Y.1
-
29
-
-
38049109536
-
Oblivious transfer based on blind signatures
-
Technical Report 2003-31, Leibniz Center, Hebrew University
-
D. Malkhi and Y. Sella. Oblivious transfer based on blind signatures. Technical Report 2003-31, Leibniz Center, Hebrew University, 2003.
-
(2003)
-
-
Malkhi, D.1
Sella, Y.2
-
30
-
-
0036475666
-
A new traitor tracing
-
S. Mitsunari, R. Sakai, and M. Kasahara. A new traitor tracing. IEICE Transactions Fundamentals, E85-A(2):481-84, 2002.
-
(2002)
IEICE Transactions Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
31
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31st ACM STOC, p. 245-254, 1999.
-
(1999)
31st ACM STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
32
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
M. Naor and B. Pinkas. Oblivious transfer with adaptive queries. In CRYPTO'99, p. 573-590.
-
CRYPTO'99
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
33
-
-
64049119146
-
Efficient oblivious transfer protocols
-
M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In 12th SODA, p. 448-457, 2001.
-
(2001)
12th SODA
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
34
-
-
22044454088
-
Computationally secure oblivious transfer
-
M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18, 2005.
-
(2005)
J. Cryptology
, vol.18
-
-
Naor, M.1
Pinkas, B.2
-
35
-
-
1942420748
-
Oblivious keyword search
-
W. Ogata and K. Kurosawa. Oblivious keyword search. J. Complexity, 20(2-3):356-371, 2004.
-
(2004)
J. Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
36
-
-
33745554010
-
Efficient blind and partially blind signatures without random oracles
-
TCC 2006
-
T. Okamoto. Efficient blind and partially blind signatures without random oracles. In TCC 2006, LNCS, p. 80-99.
-
LNCS
, pp. 80-99
-
-
Okamoto, T.1
-
37
-
-
0842310308
-
k out of n oblivious transfer without random oracles
-
W. Ogata and R. Sasahara. k out of n oblivious transfer without random oracles. IEICE Transactions, 87-A(1):147-151, 2004.
-
(2004)
IEICE Transactions
, vol.87-A
, Issue.1
, pp. 147-151
-
-
Ogata, W.1
Sasahara, R.2
-
38
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval and J. Stern. Security proofs for signature schemes. In EUROCRYPT'96, p. 387-398.
-
EUROCRYPT'96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
39
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report TR-81, Harvard Aiken Computation Laboratory
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
-
-
Rabin, M.1
-
40
-
-
0001998264
-
Conjugate Coding
-
S. Wiesner. Conjugate Coding. SIGACT News, 15, 1983. . 78-88.
-
(1983)
SIGACT News
-
-
Wiesner, S.1
|