-
1
-
-
33749993205
-
-
Au, M.H., Susilo, W., Mu, Y.: Constant-Size Dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 111-125. Springer, Heidelberg (2006)
-
Au, M.H., Susilo, W., Mu, Y.: Constant-Size Dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
38149126622
-
-
Au, M.H., Wu, Q., Susilo, W., Mu, Y.: Compact e-cash from bounded accumulator. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, Springer, Heidelberg (2006)
-
Au, M.H., Wu, Q., Susilo, W., Mu, Y.: Compact e-cash from bounded accumulator. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, Springer, Heidelberg (2006)
-
-
-
-
4
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048887476
-
Short group signatures
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
84995460223
-
Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change
-
Society for Industrial and Applied Mathematics, pp
-
Brickell, E., Gemmell, P., Kravitz, D.: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change. In: SODA '95: Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, pp. 457-466 (1995)
-
(1995)
SODA '95: Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 457-466
-
-
Brickell, E.1
Gemmell, P.2
Kravitz, D.3
-
8
-
-
24944435537
-
Compact e-cash
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
9
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
35048845114
-
Signature Schemes and Anonymous Credentials from Bilinear Maps
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
63449102764
-
-
Canard, S., Traoré, J.: On fair e-cash systems based on group signature schemes. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, 2727, pp. 237-248. Springer, Heidelberg (2003)
-
Canard, S., Traoré, J.: On fair e-cash systems based on group signature schemes. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 237-248. Springer, Heidelberg (2003)
-
-
-
-
12
-
-
0020915882
-
Blind Signatures for Untraceable Payments
-
McCurley, K.S, Ziegler, C.D, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
-
Chaum, D.: Blind Signatures for Untraceable Payments. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol. 1440, pp. 199-203. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1440
, pp. 199-203
-
-
Chaum, D.1
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
24144481228
-
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 416-431. Springer, Heidelberg (2005)
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
26444446884
-
-
Furukawa, J., Imai, H.: An efficient group signature scheme from bilinear maps. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 455-467. Springer, Heidelberg (2005)
-
Furukawa, J., Imai, H.: An efficient group signature scheme from bilinear maps. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 455-467. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
67651053584
-
Pseudonym systems
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. Selected Areas in Cryptography 184-199 (1999)
-
(1999)
Selected Areas in Cryptography
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
17
-
-
84957027786
-
Fair Electronic Cash Based on a Group Signature Scheme
-
Qing, S, Okamoto, T, Zhou, J, eds, ICICS 2001, Springer, Heidelberg
-
Maitland, G., Boyd, C.: Fair Electronic Cash Based on a Group Signature Scheme. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 461-465. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2229
, pp. 461-465
-
-
Maitland, G.1
Boyd, C.2
-
18
-
-
0033346854
-
Verifiable random functions
-
Micali, S., Rabin, M.O., Vadhan, S.P.: Verifiable random functions. In: FOCS, pp. 120-130 (1999)
-
(1999)
FOCS
, pp. 120-130
-
-
Micali, S.1
Rabin, M.O.2
Vadhan, S.P.3
-
19
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: CRYPTO, pp. 129-140 (1991)
-
(1991)
CRYPTO
, pp. 129-140
-
-
Pedersen, T.P.1
-
20
-
-
35048839792
-
k-Times Anonymous Authentication (Extended Abstract)
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Teranishi, I., Furukawa, J., Sako, K.: k-Times Anonymous Authentication (Extended Abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308-322. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
21
-
-
33745871113
-
k-times anonymous authentication with a constant proving cost
-
Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. Public Key Cryptography, pp. 525-542 (2006)
-
(2006)
Public Key Cryptography
, pp. 525-542
-
-
Teranishi, I.1
Sako, K.2
|