-
1
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Santa Barbara, CA, USA, August
-
Fiat, A., and Shamir, A.: ' How to prove yourself: practical solutions to identification and signature problems ', CRYPTO'86, Santa Barbara, CA, USA, August, 1987, p. 186-194
-
(1987)
CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
2
-
-
12344258539
-
Efficient signature generation by smart cards
-
0933-2790
-
Schnorr, C.-P.: ' Efficient signature generation by smart cards ', J. Cryptol., 1991, 4, (3), p. 161-174 0933-2790
-
(1991)
J. Cryptol.
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
3
-
-
84947558992
-
A paradoxical identity-based signature scheme resulting from zero-knowledge
-
Santa Barbara, CA, USA, August
-
Guillou, L.C., and Quisquater, J.-J.: ' A paradoxical identity-based signature scheme resulting from zero-knowledge ', CRYPTO'88, Santa Barbara, CA, USA, August, 1990, p. 216-231
-
(1990)
CRYPTO'88
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
4
-
-
0001654317
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Davos, Switzerland, May, 25-27
-
Guillou, L.C., and Quisquater, J.-J.: ' A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory ', EUROCRYPT'88, Davos, Switzerland, May, 25-27, 1988
-
(1988)
EUROCRYPT'88
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
5
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
0933-2790
-
Pointcheval, D., and Stern, J.: ' Security arguments for digital signatures and blind signatures ', J. Cryptol., 2000, 13, (3), p. 361-396 0933-2790
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
6
-
-
0035747565
-
Accountable-subgroup multisignatures
-
Philadelphia, PA, USA, November, 5-8
-
Micali, S., Ohta, K., and Reyzin, L.: ' Accountable-subgroup multisignatures ', ACM CCS 01, Philadelphia, PA, USA, November, 5-8, 2001, p. 245-254
-
(2001)
ACM CCS 01
, pp. 245-254
-
-
Micali, S.1
Ohta, K.2
Reyzin, L.3
-
7
-
-
34547339273
-
Multi-signatures in the plain public-key model and a general forking lemma
-
Alexandria, VA, USA, November, 7-11
-
Bellare, M., and Neven, G.: ' Multi-signatures in the plain public-key model and a general forking lemma ', ACM CCS 06, Alexandria, VA, USA, November, 7-11, 2006, p. 390-399
-
(2006)
ACM CCS 06
, pp. 390-399
-
-
Bellare, M.1
Neven, G.2
-
8
-
-
35048887476
-
Short group signatures
-
Santa Barbara, CA, USA, August, 15-19
-
Boneh, D., Boyen, X., and Shacham, H.: ' Short group signatures ', CRYPTO 2004, Santa Barbara, CA, USA, August, 15-19, 2004, p. 41-55
-
(2004)
CRYPTO 2004
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
9
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
0097-5397
-
Goldwasser, S., Micali, S., and Rivest, R.L.: ' A digital signature scheme secure against adaptive chosen-message attacks ', SIAM J. Comput., 1988, 17, (2), p. 281-308 0097-5397
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
10
-
-
84957705622
-
On concrete security treatment of signatures derived from identification
-
Santa Barbara, CA, USA, August, 23-27
-
Ohta, K., and Okamoto, T.: ' On concrete security treatment of signatures derived from identification ', CRYPTO'98, Santa Barbara, CA, USA, August, 23-27, 1998, p. 354-369
-
(1998)
CRYPTO'98
, pp. 354-369
-
-
Ohta, K.1
Okamoto, T.2
-
11
-
-
84947283407
-
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward security
-
Amsterdam, The Netherlands, 28 April-2 May
-
Abdalla, M., An, J.H., Bellare, M., and Namprempre, C.: ' From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward security ', EUROCRYPT 2002, Amsterdam, The Netherlands, 28 April-2 May, 2002, p. 418-433
-
(2002)
EUROCRYPT 2002
, pp. 418-433
-
-
Abdalla, M.1
An, J.H.2
Bellare, M.3
Namprempre, C.4
-
12
-
-
0344550529
-
On the (in)security of the Fiat-Shamir paradigm
-
44th, Cambridge, MA, USA, October, 11-14
-
Goldwasser, S., and Tauman Kalai, Y.: ' On the (in)security of the Fiat-Shamir paradigm ', 44th, FOCS, Cambridge, MA, USA, October, 11-14, 2003, p. 102-115
-
(2003)
FOCS
, pp. 102-115
-
-
Goldwasser, S.1
Tauman Kalai, Y.2
-
13
-
-
0024135240
-
Zero knowledge proofs of identity
-
0933-2790
-
Feige, U., Fiat, A., and Shamir, A.: ' Zero knowledge proofs of identity ', J. Cryptol., 1988, 1, (2), p. 77-94 0933-2790
-
(1988)
J. Cryptol.
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
14
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Santa Barbara, CA, USA, August, 18-22
-
Bellare, M., and Palacio, A.: ' GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks ', CRYPTO 2002, Santa Barbara, CA, USA, August, 18-22, 2002, p. 162-177
-
(2002)
CRYPTO 2002
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
15
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Santa Barbara, CA, USA, August, 16-20
-
Okamoto, T.: ' Provably secure and practical identification schemes and corresponding signature schemes ', CRYPTO'92, Santa Barbara, CA, USA, August, 16-20, 1992, p. 31-53
-
(1992)
CRYPTO'92
, pp. 31-53
-
-
Okamoto, T.1
-
16
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Interlaken, Switzerland, May, 2-6
-
Bellare, M., Namprempre, C., and Neven, G.: ' Security proofs for identity-based identification and signature schemes ', EUROCRYPT 2004, Interlaken, Switzerland, May, 2-6, 2004, p. 268-286
-
(2004)
EUROCRYPT 2004
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
17
-
-
33745855807
-
Strongly unforgeable signatures based on computational Diffie-Hellman
-
New York, NY, USA, April, 24-26
-
Boneh, D., Shen, E., and Waters, B.: ' Strongly unforgeable signatures based on computational Diffie-Hellman ', PKC 2006, New York, NY, USA, April, 24-26, 2006, p. 229-240
-
(2006)
PKC 2006
, pp. 229-240
-
-
Boneh, D.1
Shen, E.2
Waters, B.3
-
18
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Aarhus, Denmark, May, 22-26
-
Waters, B.R.: ' Efficient identity-based encryption without random oracles ', EUROCRYPT 2005, Aarhus, Denmark, May, 22-26, 2005, p. 114-127
-
(2005)
EUROCRYPT 2005
, pp. 114-127
-
-
Waters, B.R.1
-
19
-
-
0003157491
-
On-line/off-line digital signatures
-
0933-2790
-
Even, S., Goldreich Oded, and Micali, S.: ' On-line/off-line digital signatures ', J. Cryptol., 1996, 9, (1), p. 35-67 0933-2790
-
(1996)
J. Cryptol.
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Oded, G.2
Micali, S.3
-
20
-
-
0001369870
-
On the efficiency of one-time digital signatures
-
Kyongju, Korea, November, 3-7
-
Bleichenbacher, D., and Maurer, U.: ' On the efficiency of one-time digital signatures ', ASIACRYPT'96, Kyongju, Korea, November, 3-7, 1996, p. 196-209
-
(1996)
ASIACRYPT'96
, pp. 196-209
-
-
Bleichenbacher, D.1
Maurer, U.2
-
21
-
-
45749103597
-
-
Dai W.: 'Crypto++ library', http://www.cryptopcom/
-
Dai W.: 'Crypto++ library', http://www.cryptopp.com/
-
-
-
-
22
-
-
0343337504
-
Non-malleable cryptography
-
0097-5397
-
Dolev, D., Dwork, C., and Naor, M.: ' Non-malleable cryptography ', SIAM J. Comput., 2000, 30, (2), p. 391-437 0097-5397
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
23
-
-
33745223691
-
A simpler construction of CCA2-secure public-key encryption under general assumptions
-
0933-2790
-
Lindell, Y.: ' A simpler construction of CCA2-secure public-key encryption under general assumptions ', J. Cryptol., 2006, 19, (3), p. 359-377 0933-2790
-
(2006)
J. Cryptol.
, vol.19
, Issue.3
, pp. 359-377
-
-
Lindell, Y.1
-
24
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
0097-5397
-
Canetti, R., Halevi, S., and Katz, J.: ' Chosen-ciphertext security from identity-based encryption ', SIAM J. Comput., 2006, 36, (5), p. 915-942 0097-5397
-
(2006)
SIAM J. Comput.
, vol.36
, Issue.5
, pp. 915-942
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
25
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
Cambridge, MA, USA, February, 10-12
-
Dodis, Y., and Katz, J.: ' Chosen-ciphertext security of multiple encryption ', TCC 2005, Cambridge, MA, USA, February, 10-12, 2005, p. 188-209
-
(2005)
TCC 2005
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
26
-
-
84921068967
-
Secure signature schemes based on interactive protocols
-
Santa Barbara, CA, USA, August, 27-31
-
Cramer, R., and Damgård, I.: ' Secure signature schemes based on interactive protocols ', CRYPTO'95, Santa Barbara, CA, USA, August, 27-31, 1995, p. 297-310
-
(1995)
CRYPTO'95
, pp. 297-310
-
-
Cramer, R.1
Damgård, I.2
-
28
-
-
84991952665
-
General conversion for obtaining strongly existentially unforgeable signatures
-
Teranishi, I., Oyama, T., and Ogata, W.: ' General conversion for obtaining strongly existentially unforgeable signatures ', INDOCRYPT 2006, p. 191-205
-
INDOCRYPT 2006
, pp. 191-205
-
-
Teranishi, I.1
Oyama, T.2
Ogata, W.3
-
29
-
-
85025802492
-
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature
-
San Francisco, CA, USA, February, 5-9
-
Steinfeld, R., Pieprzyk, J., and Wang, H.: ' How to strengthen any weakly unforgeable signature into a strongly unforgeable signature ', CT-RSA 2007, San Francisco, CA, USA, February, 5-9, 2007, p. 357-371
-
(2007)
CT-RSA 2007
, pp. 357-371
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
30
-
-
0003691180
-
-
(Cambridge University Press, Cambridge, UK)
-
Goldreich, O.: ' Foundations of cryptography, vol. 2: Basic applications ', (Cambridge University Press, Cambridge, UK, 2004)
-
(2004)
Foundations of Cryptography, Vol. 2: Basic Applications
-
-
Goldreich, O.1
-
31
-
-
45749146124
-
Discrete-log-based signatures may not be equivalent to discrete log
-
Chennai, India, December, 4-8
-
Paillier, P., and Vergnaud, D.: ' Discrete-log-based signatures may not be equivalent to discrete log ', ASIACRYPT 2005, Chennai, India, December, 4-8, 2005
-
(2005)
ASIACRYPT 2005
-
-
Paillier, P.1
Vergnaud, D.2
-
32
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
0933-2790
-
Bellare, M., Namprempre, C., Pointcheval, D., and Semanko, M.: ' The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme ', J. Cryptol., 2003, 16, (3), p. 185-215 0933-2790
-
(2003)
J. Cryptol.
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
33
-
-
84880883264
-
Improved online/offiine signature schemes
-
Santa Barbara, CA, USA, August, 19-23
-
Shamir, A., and Tauman, Y.: ' Improved online/offiine signature schemes ', CRYPTO 2001, Santa Barbara, CA, USA, August, 19-23, 2001, p. 355-367
-
(2001)
CRYPTO 2001
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
35
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
0097-5397
-
Goldreich, O., and Krawczyk, H.: ' On the composition of zero-knowledge proof systems ', SIAM J. Comput., 1996, 25, (1), p. 169-192 0097-5397
-
(1996)
SIAM J. Comput.
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
36
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
22nd, Seattle, WA, USA, May, 15-17
-
Feige, U., and Shamir, A.: ' Witness indistinguishable and witness hiding protocols ', 22nd, ACM STOC, Seattle, WA, USA, May, 15-17, 1990, p. 416-426
-
(1990)
ACM STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
37
-
-
84944878354
-
-
(CRC Press, Boca Raton, FL), The CRC Press Series on Discrete Mathematics and its Applications
-
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A.: ' Handbook of applied cryptography ', (CRC Press, Boca Raton, FL, 1997), The CRC Press Series on Discrete Mathematics and its Applications
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
38
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, CA, USA, August, 19-23
-
Shamir, A.: ' Identity-based cryptosystems and signature schemes ', CRYPTO'84, Santa Barbara, CA, USA, August, 19-23, 1985, p. 47-53
-
(1985)
CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
39
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
St. John's, Newfoundland, Canada, August, 15-16
-
Hess, F.: ' Efficient identity based signature schemes based on pairings ', SAC 2002, St. John's, Newfoundland, Canada, August, 15-16, 2003, p. 310-324
-
(2003)
SAC 2002
, pp. 310-324
-
-
Hess, F.1
-
40
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Miami, USA, January, 6-8
-
Cha, J.C., and Cheon, J.H.: ' An identity-based signature from gap Diffie-Hellman groups ', PKC 2003, Miami, USA, January, 6-8, 2003, p. 18-30
-
(2003)
PKC 2003
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
|