-
1
-
-
84947283407
-
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security
-
ed. by L. Knudsen. LNCS Springer New York
-
M. Abdalla, J.H. An, M. Bellare, C. Namprempre, From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security, in EUROCRYPT 2002, ed. by L. Knudsen. LNCS, vol. 2332 (Springer, New York, 2002), pp. 418-433
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 418-433
-
-
Abdalla, M.1
An, J.H.2
Bellare, M.3
Namprempre, C.4
-
2
-
-
84947237328
-
On the security of joint signature and encryption
-
ed. by L. Knudsen. LNCS Springer New York
-
J.H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, in EUROCRYPT 2002, ed. by L. Knudsen. LNCS, vol. 2332 (Springer, New York, 2002), pp. 83-107
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
ed. by T. Okamoto. LNCS Springer New York
-
M. Bellare, C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, in ASIACRYPT 2000, ed. by T. Okamoto. LNCS, vol. 1976 (Springer, New York, 2000), pp. 531-545
-
(2000)
ASIACRYPT 2000
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
20544455127
-
Transitive signatures: New schemes and proofs
-
M. Bellare G. Neven 2005 Transitive signatures: New schemes and proofs IEEE Trans. Inf. Theory 51 6 2133 2151
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 2133-2151
-
-
Bellare, M.1
Neven, G.2
-
5
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attack
-
ed. by M. Yung. LNCS Springer New York
-
M. Bellare, A. Palacio, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attack, in CRYPTO 2002, ed. by M. Yung. LNCS, vol. 2442 (Springer, New York, 2002), pp. 162-177
-
(2002)
CRYPTO 2002
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press New York
-
M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, in Proc. of the 1st CCS (ACM Press, New York, 1993), pp. 62-73
-
(1993)
Proc. of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0013462475
-
Identification protocols secure against reset attacks
-
ed. by B. Pfitzmann. LNCS Springer New York
-
M. Bellare, M. Fischlin, S. Goldwasser, S. Micali, Identification protocols secure against reset attacks, in EUROCRYPT 2001, ed. by B. Pfitzmann. LNCS, vol. 2045 (Springer, New York, 2001), pp. 268-286
-
(2001)
EUROCRYPT 2001
, vol.2045
, pp. 268-286
-
-
Bellare, M.1
Fischlin, M.2
Goldwasser, S.3
Micali, S.4
-
8
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
M. Bellare C. Namprempre D. Pointcheval M. Semanko 2003 The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme J. Cryptol. 16 3 185 215
-
(2003)
J. Cryptol.
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
9
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
ed. by C. Cachin, J. Camenisch. LNCS Springer New York
-
M. Bellare, C. Namprempre, G. Neven, Security proofs for identity-based identification and signature schemes, in EUROCRYPT 2004, ed. by C. Cachin, J. Camenisch. LNCS, vol. 3027 (Springer, New York, 2004), pp. 268-286
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
10
-
-
85034644807
-
Efficient zero-knowledged identification scheme for smart cards
-
ed. by C. Gunther. LNCS Springer New York
-
T. Beth, Efficient zero-knowledged identification scheme for smart cards, in EUROCRYPT 1988, ed. by C. Gunther. LNCS, vol. 330 (Springer, New York, 1988), pp. 77-86
-
(1988)
EUROCRYPT 1988
, vol.330
, pp. 77-86
-
-
Beth, T.1
-
11
-
-
20544431698
-
Coin flipping by telephone
-
ed. by A. Gersho (University of California, Santa Barbara) Department of ECE Report No 82-04
-
M. Blum, Coin flipping by telephone, in Advances in Cryptology: A Report on CRYPTO 81, ed. by A. Gersho (University of California, Santa Barbara, 1982), Department of ECE Report No 82-04, pp. 11-15
-
(1982)
Advances in Cryptology: A Report on CRYPTO 81
, pp. 11-15
-
-
Blum, M.1
-
12
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
-
ed. by Y. Desmedt. LNCS Springer New York
-
A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme, in PKC 2003, ed. by Y. Desmedt. LNCS, vol. 2567 (Springer, New York, 2003), pp. 31-46
-
(2003)
PKC 2003
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
13
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
ed. by J. Kilian. LNCS Springer New York
-
D. Boneh, M.K. Franklin, Identity-based encryption from the Weil pairing, in CRYPTO 2001, ed. by J. Kilian. LNCS, vol. 2139 (Springer, New York, 2001), pp. 213-229
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
14
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
ed. by E. Biham. LNCS Springer New York
-
D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in EUROCRYPT 2003, ed. by E. Biham. LNCS, vol. 2656 (Springer, New York, 2003), pp. 416-432
-
(2003)
EUROCRYPT 2003
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
15
-
-
0024751876
-
Remarks on soundness of proofs
-
M. Burmester Y. Desmedt 1989 Remarks on soundness of proofs Electron. Lett. 25 22 1509 1511
-
(1989)
Electron. Lett.
, vol.25
, Issue.22
, pp. 1509-1511
-
-
Burmester, M.1
Desmedt, Y.2
-
16
-
-
35248844436
-
An identity-based signature from gap diffie-hellman groups
-
ed. by Y. Desmedt. LNCS Springer New York
-
J.C. Cha, J.H. Cheon, An identity-based signature from gap diffie-hellman groups, in PKC 2003, ed. by Y. Desmedt. LNCS, vol. 2567 (Springer, New York, 2003), pp. 18-30
-
(2003)
PKC 2003
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
18
-
-
0030169455
-
SCALPS: Smart card for limited payment systems
-
J.-F. Dhem D. Veithen J.-J. Quisquater 1996 SCALPS: Smart card for limited payment systems IEEE Micro 16 3 42 51
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 42-51
-
-
Dhem, J.-F.1
Veithen, D.2
Quisquater, J.-J.3
-
19
-
-
35248813300
-
Strong key-insulated signature schemes
-
ed. by Y. Desmedt. LNCS Springer New York
-
Y. Dodis, J. Katz, S. Xu, M. Yung, Strong key-insulated signature schemes, in PKC 2003, ed. by Y. Desmedt. LNCS, vol. 2567 (Springer, New York, 2003), pp. 130-144
-
(2003)
PKC 2003
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
20
-
-
0024135240
-
Zero knowledge proofs of identity
-
U. Feige A. Fiat A. Shamir 1988 Zero knowledge proofs of identity J. Cryptology 1 2 77 94
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
21
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
ed. by A. Odlyzko. LNCS Springer New York
-
A. Fiat, A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in CRYPTO 1986, ed. by A. Odlyzko. LNCS, vol. 263 (Springer, New York, 1986), pp. 186-194
-
(1986)
CRYPTO 1986
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
22
-
-
84944898222
-
The representation problem based on factoring
-
ed. by B. Preneel. LNCS Springer New York
-
M. Fischlin, R. Fischlin, The representation problem based on factoring, in CT-RSA 2002, ed. by B. Preneel. LNCS, vol. 2271 (Springer, New York, 2002), pp. 96-113
-
(2002)
CT-RSA 2002
, vol.2271
, pp. 96-113
-
-
Fischlin, M.1
Fischlin, R.2
-
23
-
-
77649247458
-
On the generic construction of identity-based signatures with additional properties
-
ed. by X. Lai, K. Chen. LNCS Springer New York
-
D. Galindo, J. Herranz, E. Kiltz, On the generic construction of identity-based signatures with additional properties, in ASIACRYPT 2006, ed. by X. Lai, K. Chen. LNCS, vol. 4284 (Springer, New York, 2006), pp. 178-193
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 178-193
-
-
Galindo, D.1
Herranz, J.2
Kiltz, E.3
-
24
-
-
70349557354
-
Hierarchical ID-based cryptography
-
ed. by Y. Zheng. LNCS Springer New York
-
C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in ASIACRYPT 2002, ed. by Y. Zheng. LNCS, vol. 2501 (Springer, New York, 2002), pp. 548-566
-
(2002)
ASIACRYPT 2002
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
25
-
-
85043791322
-
An identity-based identification scheme based on discrete logarithms modulo a composite number
-
ed. by I. Damgård. LNCS Springer New York
-
M. Girault, An identity-based identification scheme based on discrete logarithms modulo a composite number, in EUROCRYPT 1990, ed. by I. Damgård. LNCS, vol. 473 (Springer, New York, 1990), pp. 481-486
-
(1990)
EUROCRYPT 1990
, vol.473
, pp. 481-486
-
-
Girault, M.1
-
26
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser S. Micali R. Rivest 1988 A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 17 2 281 308
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
27
-
-
84947558992
-
A "paradoxical" identity-based signature scheme resulting from zero-knowledge
-
ed. by S. Goldwasser. LNCS Springer New York
-
L.C. Guillou, J.-J. Quisquater, A "paradoxical" identity-based signature scheme resulting from zero-knowledge, in CRYPTO 1988, ed. by S. Goldwasser. LNCS, vol. 403 (Springer, New York, 1989), pp. 216-231
-
(1989)
CRYPTO 1988
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
28
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer New York
-
F. Hess, Efficient identity based signature schemes based on pairings, in Selected Areas in Cryptography, SAC 2002, ed. by K. Nyberg, H. Heys (Springer, New York, 2003), pp. 310-324
-
(2003)
Selected Areas in Cryptography, SAC 2002
, pp. 310-324
-
-
Hess, F.1
Nyberg, K.2
Heys, H.3
-
29
-
-
0024770898
-
One-way functions are essential for complexity based cryptography
-
IEEE Computer Society Press New York
-
R. Impagliazzo, M. Luby, One-way functions are essential for complexity based cryptography, in Proc. of the 30th FOCS, Research Triangle Park, North Carolina, October 1989 (IEEE Computer Society Press, New York, 1989), pp. 230-235
-
(1989)
Proc. of the 30th FOCS Research Triangle Park, North Carolina October 1989
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
30
-
-
35048857354
-
From digital signature to ID-based identification/signature
-
ed. by F. Bao, R. Deng, J. Zhou. LNCS Springer New York
-
K. Kurosawa, S.-H. Heng, From digital signature to ID-based identification/signature, in PKC 2004, ed. by F. Bao, R. Deng, J. Zhou. LNCS, vol. 2947 (Springer, New York, 2004), pp. 248-261
-
(2004)
PKC 2004
, vol.2947
, pp. 248-261
-
-
Kurosawa, K.1
Heng, S.-H.2
-
33
-
-
85031804925
-
A modification of the Fiat-Shamir scheme
-
ed. by S. Goldwasser. LNCS Springer New York
-
K. Ohta, T. Okamoto, A modification of the Fiat-Shamir scheme, in CRYPTO 1988, ed. by S. Goldwasser. LNCS, vol. 403 (Springer, New York, 1990), pp. 232-243
-
(1990)
CRYPTO 1988
, vol.403
, pp. 232-243
-
-
Ohta, K.1
Okamoto, T.2
-
34
-
-
84957705622
-
On concrete security treatment of signatures derived from identification
-
ed. by H. Krawczyk. LNCS Springer New York
-
K. Ohta, T. Okamoto, On concrete security treatment of signatures derived from identification, in CRYPTO 1998, ed. by H. Krawczyk. LNCS, vol. 1462 (Springer, New York, 1998), pp. 354-370
-
(1998)
CRYPTO 1998
, vol.1462
, pp. 354-370
-
-
Ohta, K.1
Okamoto, T.2
-
35
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
ed. by E. Brickell. LNCS Springer New York
-
T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes, in CRYPTO 1992, ed. by E. Brickell. LNCS, vol. 740 (Springer, New York, 1993), pp. 31-53
-
(1993)
CRYPTO 1992
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
36
-
-
33745972475
-
Fast signature generation with a Fiat-Shamir-like scheme
-
ed. by I. Damgård. LNCS Springer New York
-
H. Ong, C.-P. Schnorr, Fast signature generation with a Fiat-Shamir-like scheme, in EUROCRYPT 1990, ed. by I. Damgård. LNCS, vol. 473 (Springer, New York, 1990), pp. 432-440
-
(1990)
EUROCRYPT 1990
, vol.473
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.-P.2
-
38
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval J. Stern 2000 Security arguments for digital signatures and blind signatures J. Cryptol. 13 3 361 396
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
39
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM Press New York
-
J. Rompel, One-way functions are necessary and sufficient for secure signatures, in Proc. of the 22nd ACM STOC, Baltimore, Maryland, May 14-16 1990 (ACM Press, New York, 1990), pp. 387-394
-
(1990)
Proc. of the 22nd ACM STOC Baltimore, Maryland May 14-16 1990
, pp. 387-394
-
-
Rompel, J.1
-
40
-
-
84958968363
-
On the security of Girault's identification scheme
-
ed. by H. Imai, Y. Zheng. LNCS Springer New York
-
S. Saeednia, R. Safavi-Naini, On the security of Girault's identification scheme, in PKC 1998, ed. by H. Imai, Y. Zheng. LNCS, vol. 1431 (Springer, New York, 1998), pp. 149-153
-
(1998)
PKC 1998
, vol.1431
, pp. 149-153
-
-
Saeednia, S.1
Safavi-Naini, R.2
-
41
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, January
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, in SCIS 2000, Okinawa, Japan, January 2000
-
(2000)
SCIS 2000
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
42
-
-
0000537828
-
Efficient identification and signatures for smartcards
-
ed. by G. Brassard. LNCS Springer New York
-
C.-P. Schnorr, Efficient identification and signatures for smartcards, in CRYPTO 1989, ed. by G. Brassard. LNCS, vol. 435 (Springer, New York, 1990), pp. 239-252
-
(1990)
CRYPTO 1989
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
43
-
-
84955587394
-
t -root identification and signatures
-
ed. by N. Koblitz. LNCS Springer New York
-
t -root identification and signatures, in CRYPTO 1996, ed. by N. Koblitz. LNCS, vol. 1109 (Springer, New York, 1996), pp. 143-156
-
(1996)
CRYPTO 1996
, vol.1109
, pp. 143-156
-
-
Schnorr, C.-P.1
-
44
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
ed. by G.R. Blakely, D. Chaum. LNCS Springer New York
-
A. Shamir, Identity-based cryptosystems and signature schemes, in CRYPTO 1984, ed. by G.R. Blakely, D. Chaum. LNCS, vol. 196 (Springer, New York, 1984), pp. 47-53
-
(1984)
CRYPTO 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
45
-
-
0004746654
-
On the security of a practical identification scheme
-
V. Shoup 1999 On the security of a practical identification scheme J. Cryptol. 12 4 247 260
-
(1999)
J. Cryptol.
, vol.12
, Issue.4
, pp. 247-260
-
-
Shoup, V.1
-
46
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes
-
ed. by M. Yung. LNCS Springer New York
-
J. Stern, D. Pointcheval, J. Malone-Lee, N.P. Smart, Flaws in applying proof methodologies to signature schemes, in CRYPTO 2002, ed. by M. Yung. LNCS, vol. 2442 (Springer, New York, 2002), pp. 93-110
-
(2002)
CRYPTO 2002
, vol.2442
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.P.4
-
47
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
H.C. Williams 1980 A modification of the RSA public-key encryption procedure IEEE Trans. Inf. Theory 26 6 726 729
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
48
-
-
0037330749
-
An identity-based signature scheme from the Weil pairing
-
X. Yi 2003 An identity-based signature scheme from the Weil pairing IEEE Commun. Lett. 7 2 76 78
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.2
, pp. 76-78
-
-
Yi, X.1
|