-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Proc. CRYPTO, Springer, 2000
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Proc. CRYPTO 2000, pages 255-270. Springer, 2000. Lecture Notes in Computer Science No. 1880.
-
(1880)
Lecture Notes in Computer Science No
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
77049110270
-
Some Open Issues and New Directions in Group Signatures
-
Financial Cryptography'99
-
G. Ateniese and G. Tsudik. Some Open Issues and New Directions in Group Signatures. In Financial Cryptography'99. Lecture Notes in Computer Science No. 1880.
-
(1880)
Lecture Notes in Computer Science No
-
-
Ateniese, G.1
Tsudik, G.2
-
3
-
-
84954406641
-
Secret handshakes from pairing-based key agreements
-
May
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H. Wong. Secret handshakes from pairing-based key agreements. In 24th IEEE Symposium on Security and Privacy, May 2003.
-
(2003)
24th IEEE Symposium on Security and Privacy
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.6
-
4
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
E. Biham, editor, Advances in Cryptology, EUROCRYPT 2003, of, Springer
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. EUROCRYPT, Springer, 2000
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. EUROCRYPT 2000, pages 139-155. Springer, 2000. Lecture Notes in Computer Science No. 1807.
-
(1807)
Lecture Notes in Computer Science No
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
7
-
-
77049087736
-
The case of dynamic groups. Cryptology ePrint Archive
-
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures:, Report 2004/077
-
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. Cryptology ePrint Archive, Report 2004/077, 2004. http://eprint.iacr.org/.
-
(2004)
-
-
-
8
-
-
77049083563
-
-
C. Boyd, W. Mao, and K. Paterson. Deniable authenticated key establishment for internet protocols
-
C. Boyd, W. Mao, and K. Paterson. Deniable authenticated key establishment for internet protocols.
-
-
-
-
10
-
-
50849092893
-
Dynamic group Diffie-Hellman key exchange under standard assumptions
-
L. R. Knudsen, editor, Proc. of Eurocrypt 02, of
-
E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In L. R. Knudsen, editor, Proc. of Eurocrypt 02, volume 2332 of LNCS, page 321-336.
-
LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
84948991087
-
A secure and efficient conference key distribution system
-
A. D. Santis, editor, Proc. EUROCRYPT, Springer, No. 950
-
M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In A. D. Santis, editor, Proc. EUROCRYPT 94, pages 275-286. Springer, 1994. Lecture Notes in Computer Science No. 950.
-
(1994)
Lecture Notes in Computer Science
, vol.94
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
12
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
M. Yung, editor, Proc. CRYPTO 2002, of
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 61-76.
-
Lecture Notes in Computer Science
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B.S. Kaliski Jr, editor, Proc. CRYPTO 1997, of, Springer-Verlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B.S. Kaliski Jr., editor, Proc. CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
14
-
-
35048855095
-
Secret handshakes from ca-oblivious encryption
-
Advances in Cryptology, ASIACRYPT 2004, of, Springer
-
C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from ca-oblivious encryption. In Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 293-307. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84-88, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
16
-
-
0001604533
-
Blind signatures for untraceable payments
-
R. L. Rivest, A. Sherman, and D. Chaum, editors
-
D. Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82, pages 199-203.
-
Proc. CRYPTO
, vol.82
, pp. 199-203
-
-
Chaum, D.1
-
17
-
-
85024290278
-
Group signatures
-
D.W. Davies, editor, Advances in Cryptology, Eurocrypt '91, Berlin, Springer-Verlag
-
D. Chaum and E. V. Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology - Eurocrypt '91, pages 257-265, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science No. 547.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
20
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. Fischer, N. Lynch, and M. Patterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32(2):374-382, 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.1
Lynch, N.2
Patterson, M.3
-
21
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
D. Boneh, editor, Proc. CRYPTO 2003, of, Springer-Verlag
-
J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 110-125. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
22
-
-
35048841283
-
Traceable signatures
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, of, Springer
-
A. Kiayias, Y. Tsiounis, and M. Yung. Traceable signatures. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
23
-
-
29244453439
-
Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive
-
Report 2004/076
-
A. Kiayias and M. Yung. Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/.
-
(2004)
-
-
Kiayias, A.1
Yung, M.2
-
24
-
-
35248816546
-
Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols
-
D. Boneh, editor, Proc. CRYPTO 2003, of, Springer-Verlag
-
H. Krawczyk. Sigma: The 'sign-and-mac' approach to authenticated diffie-hellman and its use in the ike-protocols. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 400-425. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
26
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
J. Kilian, editor, Proc. CRYPTO 2001, of, Springer-Verlag
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In J. Kilian, editor, Proc. CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 41-62. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
27
-
-
79960836060
-
Deniable ring authentication
-
M. Yung, editor, Proc. CRYPTO 2002, of
-
M. Naor. Deniable ring authentication. In M. Yung, editor, Proc. CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 481-498. 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
30
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems, 11(8):769-780, 2000.
-
(2000)
IEEE Trans. on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
31
-
-
8344270972
-
Securing dynamic membership information in multicast communications
-
Y. Sun and K. Liu. Securing dynamic membership information in multicast communications. In IEEE Infocom'04.
-
IEEE Infocom'04
-
-
Sun, Y.1
Liu, K.2
-
32
-
-
77049122923
-
-
G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. Full version of the present paper available from the authors
-
G. Tsudik and S. Xu. A Flexible Framework for Secret Handshakes. Full version of the present paper (available from the authors).
-
-
-
-
34
-
-
0033893174
-
Secure group communication using key graphs
-
Preliminary version in SIGCOMM'98, 8
-
C. Wong, M. Gouda, and S. Lam. Secure group communication using key graphs. IEEE/ACM Transactions on Networking (Preliminary version in SIGCOMM'98), 8, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
36
-
-
14844289583
-
-
S. Xu and M. Yung. k-anonymous secret handshakes with reusable credentials. In Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), pages 158-167. ACM Press, 2004.
-
S. Xu and M. Yung. k-anonymous secret handshakes with reusable credentials. In Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), pages 158-167. ACM Press, 2004.
-
-
-
|