-
1
-
-
84921023488
-
Some open issues and new directions in group signatures
-
Financial Cryptography 1999, of
-
G. Ateniese and G. Tsudik, Some open issues and new directions in group signatures. Financial Cryptography 1999, volume 1648 of LNCS.
-
LNCS
, vol.1648
-
-
Ateniese, G.1
Tsudik, G.2
-
3
-
-
84945309966
-
Proofs of knowledge for non-monotone discrete-log formulae and applications
-
Proceedings of International Security Conference ISC 2002, of
-
E. Bresson and J. Stern., Proofs of knowledge for non-monotone discrete-log formulae and applications. In Proceedings of International Security Conference (ISC 2002), volume 2433 of LNCS.
-
LNCS
, vol.2433
-
-
Bresson, E.1
Stern, J.2
-
4
-
-
63449136683
-
-
J. Camenisch, A note on one of the assumptions. Jan Camenisch Home Page, Selected Publications
-
J. Camenisch., A note on one of the assumptions. Jan Camenisch Home Page - Selected Publications.
-
-
-
-
5
-
-
0013175080
-
An efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Eurocrypt 2001, of
-
J. Camenisch and A. Lysyanskaya. An efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Eurocrypt 2001, volume 2045 of LNCS.
-
LNCS
, vol.2045
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
84937428748
-
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. Crypto 2002, 2442 of LNCS. 7. J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. Eurocrypt 99, 1592 of LNCS.
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. Crypto 2002, volume 2442 of LNCS. 7. J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. Eurocrypt 99, volume 1592 of LNCS.
-
-
-
-
7
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Crypto 97, of
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. Crypto 97, volume 1294 of LNCS.
-
LNCS
, vol.1294
-
-
Camenisch, J.1
Stadler, M.2
-
8
-
-
0001604533
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. Crypto 82.
-
Crypto 82
-
-
Chaum, D.1
-
9
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
Crypto '86, of
-
D. Chaum and J. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. Crypto '86, volume 263 of LNCS.
-
LNCS
, vol.263
-
-
Chaum, D.1
Evertse, J.2
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Crypto '86, of
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Crypto '86, volume 263 of LNCS.
-
LNCS
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
0041291986
-
-
RFC 3280, April
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X509 public key infrastructure: Certificate and Certificate Revocation List (CRL) Profile. Network Working Group, RFC 3280, April 2002.
-
(2002)
Internet X509 public key infrastructure: Certificate and Certificate Revocation List (CRL) Profile. Network Working Group
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
13
-
-
67651053584
-
Pseudonym systems
-
Proceedings of Selected Areas in Cryptography, of
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. Proceedings of Selected Areas in Cryptography 1999, volume 1758 of LNCS.
-
(1999)
LNCS
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
15
-
-
84946849368
-
Self-blindable credential certificates from the weil pairing
-
ASI-ACRYPT 2001, of
-
E. Verheul. Self-blindable credential certificates from the weil pairing. ASI-ACRYPT 2001, volume 2248 of LNCS.
-
LNCS
, vol.2248
-
-
Verheul, E.1
|