-
1
-
-
84947283407
-
From identification to signatures via the fiatshamir transform: minimizing assumptions for security and forward–security
-
L. Knudsen (Ed) Lecture Notes in Computer Science, Amsterdam, The Netherland: Springer
-
Abdalla, M., An, J.H., Bellare, M. and Namprempre, C. (2002) ‘From identification to signatures via the fiatshamir transform: minimizing assumptions for security and forward–security’, in L. Knudsen (Ed). Advances in Cryptology – EUROCRYPT’02, Vol. 2332, Lecture Notes in Computer Science, Amsterdam, The Netherland: Springer, pp.418–433.
-
(2002)
Advances in Cryptology – EUROCRYPT’02
, vol.2332
, pp. 418-433
-
-
Abdalla, M.1
An, J.H.2
Bellare, M.3
Namprempre, C.4
-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare (Ed) Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer
-
Ateniese, G., Camenisch, J., Joye, M. and Tsudik, G. (2000) ‘A practical and provably secure coalition-resistant group signature scheme’, in M. Bellare (Ed). Advances in Cryptology CRYPTO ’00, Vol. 1880, Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer.
-
(2000)
Advances in Cryptology CRYPTO ’00
, vol.1880
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84921023488
-
Some open issues and new directions in group signatures
-
M. Franklin (Ed) Anguilla, British West Indies, February 22–25, proceedings Lecture Notes in Computer Science, Springer-Verlag
-
Ateniese, G. and Tsudik, G. (1999) ‘Some open issues and new directions in group signatures’, in M. Franklin (Ed). Financial cryptography: Third International Conference, FC ’99, Anguilla, British West Indies, February 22–25, proceedings, Vol. 1648, Lecture Notes in Computer Science, Springer-Verlag, pp.196–211.
-
(1999)
Financial cryptography: Third International Conference, FC ’99
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
4
-
-
35248843604
-
Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions
-
E. Biham (Ed) Lecture Notes in Computer Science, Warsaw, Poland: Springer
-
Bellare, M., Micciancio, D. and Warinschi, B. (2003) ‘Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions’, in E. Biham (Ed). Advances in Cryptology – EUROCRYPT 03, Vol. 2656, Lecture Notes in Computer Science, Warsaw, Poland: Springer.
-
(2003)
Advances in Cryptology – EUROCRYPT 03
, vol.2656
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
5
-
-
24144477851
-
Foundations of group signatures: the case of dynamic groups
-
A. Menezes (Ed) Lecture Notes in Computer Science, Springer
-
Bellare, M., Shi, H. and Zhang, C. (2005) ‘Foundations of group signatures: the case of dynamic groups’, in A. Menezes (Ed). CT-RSA, Vol. 3376, Lecture Notes in Computer Science, Springer, pp.136–153.
-
(2005)
CT-RSA
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
6
-
-
84947778144
-
The decision diffie-hellman problem
-
J. Buhler (Ed) Lecture Notes in Computer Science, Springer-Verlag
-
Boneh, D. (1998) ‘The decision diffie-hellman problem’, in J. Buhler (Ed). the Third Algorithmic Number Theory Symposium, Vol. 1423, Lecture Notes in Computer Science, Springer-Verlag, pp.48–63.
-
(1998)
Third Algorithmic Number Theory Symposium
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
7
-
-
35048887476
-
Short group signatures
-
M. Franklin (Ed) International Association for Cryptologic Research, Springer-Verlag
-
Boneh, D., Boyen, X. and Shacham, H. (2004) ‘Short group signatures’, in M. Franklin (Ed). Advances in Cryptology – CRYPTO’ 04, Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag.
-
(2004)
Advances in Cryptology – CRYPTO’ 04, Lecture Notes in Computer Science
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
84957354154
-
Efficient and generalized group signatures
-
W. Fumy (Ed) International Conference on the Theory and Application of Cryptographic Techniques, Lecture Notes in Computer Science, International Association for Cryptologic Research
-
Camenisch, J. (1997) ‘Efficient and generalized group signatures’, in W. Fumy (Ed). Advances in Cryptology – EUROCRYPT ’97, International Conference on the Theory and Application of Cryptographic Techniques, Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer, pp.465–479.
-
(1997)
Advances in Cryptology – EUROCRYPT ’97
, vol.Springer
, pp. 465-479
-
-
Camenisch, J.1
-
9
-
-
84880895254
-
An identity escrow scheme with appointed verifiers
-
J. Kilian (Ed) Lecture Notes in Computer Science, International Association for Cryptologic Research, Berlin, Germany: Springer-Verlag
-
Camenisch, J. and Lysyanskaya, A. (2001) ‘An identity escrow scheme with appointed verifiers’, in J. Kilian (Ed). Advances in Cryptology – CRYPTO ’ 01, Vol. 2139, Lecture Notes in Computer Science, International Association for Cryptologic Research, Berlin, Germany: Springer-Verlag, pp.388–407.
-
(2001)
Advances in Cryptology – CRYPTO ’ 01
, vol.2139
, pp. 388-407
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84947809553
-
A group signature scheme with improved efficiency
-
K. Ohta (Ed) Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag
-
Camenisch, J. and Michels, M. (1998) ‘A group signature scheme with improved efficiency’, in K. Ohta (Ed). ASIACRYPT: Advances in Cryptology – ASIACRYPT: International Conference on the Theory and Application of Cryptology, Vol. 1514, Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, pp.160–174.
-
(1998)
ASIACRYPT: Advances in Cryptology – ASIACRYPT: International Conference on the Theory and Application of Cryptology
, vol.1514
, pp. 160-174
-
-
Camenisch, J.1
Michels, M.2
-
11
-
-
84921060028
-
Separability and efficiency for generic group signature schemes (extended abstract)
-
M.J. Wiener, (Ed) Lecture Notes in Computer Science, Springer
-
Camenisch, J. and Michels, M. (1999) ‘Separability and efficiency for generic group signature schemes (extended abstract)’, in M.J. Wiener, (Ed). 19th Internaional Advances in Cryptology Conference – CRYPTO ’99, Vol. 1666, Lecture Notes in Computer Science, Springer, pp.413–430.
-
(1999)
19th Internaional Advances in Cryptology Conference – CRYPTO ’99
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
12
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B.S. Kaliski Jr. (Ed) 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, Proceedings Lecture Notes in Computer Science 1294 Springer 1997
-
Camenisch, J. and Stadler, M. (1997) ‘Efficient group signature schemes for large groups’, in B.S. Kaliski Jr. (Ed). Advances in Cryptology – CRYPTO ’97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, Proceedings Lecture Notes in Computer Science 1294 Springer 1997, pp.410–424.
-
(1997)
Advances in Cryptology – CRYPTO ’97
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
85024290278
-
Group signatures
-
D.W. Davies (Ed) (Lecture Notes in Computer Science 547), Brighton, UK: Springer-Verlag
-
Chaum, D. and van Heyst, E. (1991) ‘Group signatures’, in D.W. Davies (Ed). Advances in Cryptology, Proceedings of Eurocrypt ’91, (Lecture Notes in Computer Science 547), Brighton, UK: Springer-Verlag, pp.257–265.
-
(1991)
Advances in Cryptology, Proceedings of Eurocrypt ’91
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
14
-
-
0000710463
-
New group signature schemes (extended abstract)
-
A. De Santis (Ed) Lecture Notes in Computer Science, Springer-Verlag, 1995
-
Chen, L. and Pedersen, T.P. (1994) ‘New group signature schemes (extended abstract)’, in A. De Santis (Ed). Advances in Cryptology – EUROCRYPT ’94, Vol. 950, Lecture Notes in Computer Science, Springer-Verlag, 1995, pp.171–181.
-
(1994)
Advances in Cryptology – EUROCRYPT ’94
, vol.950
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
15
-
-
85024261619
-
Signature schemes based on the strong RSA assumption
-
Cramer, R. and Shoup, V. (2000) ‘Signature schemes based on the strong RSA assumption’, ACM Transactions on Information and System Security, Vol. 3, No. 3, pp.161–185.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
New Orleans, LA
-
Dolev, D., Dwork, C. and Naor, M. (1991) ‘Non-malleable cryptography (extended abstract)’, Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing, New Orleans, LA, pp.542–552.
-
(1991)
Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
17
-
-
0343337504
-
Non-malleable cryptography
-
A preliminary version appeared in 23rd STOC, 1991
-
Dolev, D., Dwork, C. and Naor, M. (2000) ‘Non-malleable cryptography’, J. Siam SICOMP, A preliminary version appeared in 23rd STOC, 1991, Vol. 30, No. 2, pp.391–437.
-
(2000)
J. Siam SICOMP
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
18
-
-
84990731886
-
How to prove yourself: practical solutions to identification and signature problems
-
A.M. Odlyzko (Ed) Lecture Notes in Computer Science, Springer Verlag
-
Fiat, A. and Shamir, A. (1986) ‘How to prove yourself: practical solutions to identification and signature problems’, A.M. Odlyzko (Ed). Proceedings of CRYPTO’86, Vol. 263, Lecture Notes in Computer Science, Springer Verlag, pp.186–194.
-
(1986)
Proceedings of CRYPTO’86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
19
-
-
84946827596
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
C. Boyd (Ed) Lecture Notes in Computer Science, Springer Verlag
-
Fouque, P-A. and Pointcheval, D. (2001) ‘Threshold cryptosystems secure against chosen-ciphertext attacks’, C. Boyd (Ed). ASIACRYPT: Advances in Cryptology – ASIACRYPT: International Conference on the Theory and Application of Cryptology, Vol. 2248, Lecture Notes in Computer Science, Springer Verlag, pp.351–368.
-
(2001)
ASIACRYPT: Advances in Cryptology – ASIACRYPT: International Conference on the Theory and Application of Cryptology
, vol.2248
, pp. 351-368
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
20
-
-
84926399824
-
On the foundations of modern cryptography
-
B.S. Kaliski Jr. (Ed) 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, Proceedings Lecture Notes in Computer Science 1294 Springer 1997
-
Goldreich, O. (1997) ‘On the foundations of modern cryptography’, in B.S. Kaliski Jr. (Ed). Advances in Cryptology – CRYPTO ’97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, Proceedings Lecture Notes in Computer Science 1294 Springer 1997, pp.46–74.
-
(1997)
Advances in Cryptology – CRYPTO ’97
, pp. 46-74
-
-
Goldreich, O.1
-
22
-
-
0021555016
-
A “Paradoxical” solution to the signature problem (extended abstract)
-
Singer Island, FL: IEEE
-
Goldwasser, S., Micali, S. and Rivest, R.L. (1984) ‘A “Paradoxical” solution to the signature problem (extended abstract)’, 25th Annual Symposium on Foundations of Computer Science, Singer Island, FL: IEEE, pp.441–448.
-
(1984)
25th Annual Symposium on Foundations of Computer Science
, pp. 441-448
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
23
-
-
35048841283
-
Traceable signatures
-
C. Cachin and J. Camenisch (Eds) Lecture Notes in Computer Science, Interlaken, Switzerland: Springer
-
Kiayias, A., Tsiounis, Y. and Yung, M. (2004) ‘Traceable signatures’, in C. Cachin and J. Camenisch (Eds). Advances in Cryptology – EUROCRYPT ’ 04, Vol. 3027, Lecture Notes in Computer Science, Interlaken, Switzerland: Springer, pp.571–589.
-
(2004)
Advances in Cryptology – EUROCRYPT ’ 04
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
24
-
-
35248872023
-
Extracting group signatures from traitor tracing schemes
-
E. Biham (Ed) Lecture Notes in Computer Science, Warsaw, Poland: Springer
-
Kiayias, A. and Yung, M. (2003) ‘Extracting group signatures from traitor tracing schemes’, in E. Biham (Ed). Advances in Cryptology – EUROCRYPT’ 03, Vol. 2656, Lecture Notes in Computer Science, Warsaw, Poland: Springer, pp.630–648.
-
(2003)
Advances in Cryptology – EUROCRYPT’ 03
, vol.2656
, pp. 630-648
-
-
Kiayias, A.1
Yung, M.2
-
25
-
-
29244453439
-
Group signatures: provable security, efficient constructions and anonymity from trapdoorholders
-
E. Dawson and S. Vaudenay (Eds)
-
Kiayias, A. and Yung, M. (2004) ‘Group signatures: provable security, efficient constructions and anonymity from trapdoorholders’, E. Dawson and S. Vaudenay (Eds). Cryptology ePrint Archive, Report 04/076, Available at: http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report 04/076
-
-
Kiayias, A.1
Yung, M.2
-
26
-
-
33646202553
-
Efficient secure group signatures with dynamic joins and keeping anonymity against group managers
-
First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, 28–30 September, Proceedings Lecture Notes in Computer Science, Springer
-
Kiayias, A. and Yung, M. (2005) ‘Efficient secure group signatures with dynamic joins and keeping anonymity against group managers’, Progress in Cryptology – Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, 28–30 September, Proceedings, Vol. 3715, Lecture Notes in Computer Science, Springer, pp.151–170.
-
(2005)
Progress in Cryptology – Mycrypt 2005
, vol.3715
, pp. 151-170
-
-
Kiayias, A.1
Yung, M.2
-
27
-
-
84957649548
-
Identity escrow
-
H. Krawczyk (Ed) Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer
-
Kilian, J. and Petrank, E. (1998) ‘Identity escrow’, in H. Krawczyk (Ed). Advances in Cryptology – CRYPTO ’ 98, Vol. 1462, Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer, pp.169–185.
-
(1998)
Advances in Cryptology – CRYPTO ’ 98
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
29
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
B. Awerbuch (Ed) Baltimore, MY: ACM Press
-
Naor, M. and Yung, M. (1990) ‘Public-key cryptosystems provably secure against chosen ciphertext attacks’, in B. Awerbuch (Ed). Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, Baltimore, MY: ACM Press, pp.427–437.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
30
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D. and Stern, J. (2000) ‘Security arguments for digital signatures and blind signatures’, Journal of Cryptology, Vol. 13, No. 3, pp.361–396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
31
-
-
84974554584
-
Non-interactive zero knowledge proof of knowledge and chosen ciphertext attack
-
J. Feigenbaum (Ed) Lecture Notes in Computer Science, International Association for Cryptologic Research, Berlin Germany: Springer-Verlag
-
Rackoff, C. and Simon, D.R. (1992) ‘Non-interactive zero knowledge proof of knowledge and chosen ciphertext attack’, in J. Feigenbaum (Ed). Advances in Cryptology-CRYPTO’91, Vol. 576, Lecture Notes in Computer Science, International Association for Cryptologic Research, Berlin Germany: Springer-Verlag, pp.433–444.
-
(1992)
Advances in Cryptology-CRYPTO’91
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
32
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
IEEE P. Beame (Ed) 17–19 Ocotber, New York, IEEE Computer Society Press
-
Sahai, A. (1999) ‘Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. in IEEE P. Beame (Ed). 40th Annual Symposium on Foundations of Computer Science, 17–19 Ocotber, New York, IEEE Computer Society Press, pp.543–553.
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 543-553
-
-
Sahai, A.1
|