-
1
-
-
15744367730
-
Design and implementation of the idemix anonymous credential system
-
3419, IBM Research Division May
-
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. Technical Report Research Report RZ 3419, IBM Research Division (May 2002)
-
(2002)
Technical Report Research Report RZ
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
2
-
-
33749684958
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
3295, IBM Research Division November
-
Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Technical Report Research Report RZ 3295, IBM Research Division (November 2000)
-
(2000)
Technical Report Research Report RZ
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
3
-
-
33744781066
-
-
Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 196-211. Springer, Heidelberg (2004)
-
Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 196-211. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030-1044 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Chaum, D., Evertse, J.H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118-167. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.H.2
-
6
-
-
84955571224
-
Access with pseudonyms
-
Dawson, E.P, Golic, J.D, eds, Cryptography: Policy and Algorithms 1995, Springer, Heidelberg
-
Chen, L.: Access with pseudonyms. In: Dawson, E.P., Golic, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 232-243. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1029
, pp. 232-243
-
-
Chen, L.1
-
7
-
-
67651053584
-
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 184-199. Springer, Heidelberg (2000)
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
-
-
-
8
-
-
84957610389
-
An efficient divisible electronic cash scheme
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Okamoto, T.: An efficient divisible electronic cash scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 438-451. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 438-451
-
-
Okamoto, T.1
-
9
-
-
84957661460
-
Easy come - easy go divisible cash
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Chan, A.H., Frankel, Y., Tsiounis, Y.: Easy come - easy go divisible cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 561-575. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 561-575
-
-
Chan, A.H.1
Frankel, Y.2
Tsiounis, Y.3
-
10
-
-
24944435537
-
-
40, pp
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: [40], pp. 302-321
-
Compact e-cash
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
11
-
-
14844295011
-
-
41, pp
-
Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: [41], pp. 132-145
-
Direct anonymous attestation
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
12
-
-
33749661564
-
A cryptographic framework for the controlled release of certified data
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2004, Springer, Heidelberg
-
Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 20-42. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3957
, pp. 20-42
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
-
13
-
-
84957043547
-
-
Ateniese, G., Song, D.X., Tsudik, G.: Quasi-efficient revocation in group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, 2357, pp. 183-197. Springer, Heidelberg (2003)
-
Ateniese, G., Song, D.X., Tsudik, G.: Quasi-efficient revocation in group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 183-197. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
33846420271
-
Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps
-
Nakanishi, T., Funabiki, N.: Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. IEICE Transactions 90-A(1), 65-74 (2007)
-
(2007)
IEICE Transactions
, vol.90-A
, Issue.1
, pp. 65-74
-
-
Nakanishi, T.1
Funabiki, N.2
-
16
-
-
33845933643
-
-
42, pp
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: [42], pp. 41-55
-
Short group signatures
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
17
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Benaloh, J.C., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.C.1
de Mare, M.2
-
19
-
-
84868996475
-
-
West Virginia Department of Transportation, Division of Motor Vehicles
-
West Virginia Department of Transportation, Division of Motor Vehicles: Wvdmv fy 2005 annual report (2005), http://www.wvdot.com/6-motorists/dmv/ downloads/DMVAnnualReport2005.pdf
-
(2005)
Wvdmv fy 2005 annual report
-
-
-
20
-
-
38049029638
-
-
Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 253-269. Springer, Heidelberg (2007)
-
Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 253-269. Springer, Heidelberg (2007)
-
-
-
-
21
-
-
24144480841
-
-
Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 275-292. Springer, Heidelberg (2005)
-
Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275-292. Springer, Heidelberg (2005)
-
-
-
-
22
-
-
38149049937
-
A new dynamic accumulator for batch updates
-
Qing, S, Imai, H, Wang, G, eds, ICICS 2007, Springer, Heidelberg
-
Wang, P., Wang, H., Pieprzyk, J.: A new dynamic accumulator for batch updates. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 98-112. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 98-112
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
23
-
-
24944562007
-
-
40, pp
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: [40], pp. 440-456
-
Hierarchical identity based encryption with constant size ciphertext
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
24
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
25
-
-
37149007674
-
-
Boyen, X., Waters, B.: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 1-15. Springer, Heidelberg (2007)
-
Boyen, X., Waters, B.: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
-
-
-
26
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161-174 (1991)
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
27
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
28
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Camenisch, J.L., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.L.1
Michels, M.2
-
29
-
-
0008317070
-
-
PhD thesis, ETH Zurich, Diss. ETH No. 12520, Har- tung Gorre Verlag, Konstanz
-
Camenisch, J.L.: Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. PhD thesis, ETH Zurich, Diss. ETH No. 12520, Har- tung Gorre Verlag, Konstanz (1998)
-
(1998)
Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem
-
-
Camenisch, J.L.1
-
30
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Brands, S.: Rapid demonstration of linear relations connected by boolean operators. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 318-333. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
31
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Cramer, R., Damgard, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
32
-
-
24644493543
-
Proof systems for general statements about discrete logarithms
-
Institute for Theoretical Computer Science, ETH Zurich March
-
Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zurich (March 1997)
-
(1997)
Technical Report TR
, vol.260
-
-
Camenisch, J.1
Stadler, M.2
-
34
-
-
33745554010
-
-
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 80-99. Springer, Heidelberg (2006)
-
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
-
-
-
-
35
-
-
33749993205
-
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic -taa. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 111-125. Springer, Heidelberg (2006)
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic -taa. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
-
-
-
-
36
-
-
85136137605
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials. Cryptology ePrint Archive
-
Report 2008/634
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. Cryptology ePrint Archive, Report 2008/634 (2008)
-
(2008)
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
37
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
38
-
-
40249111589
-
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and nonin- teractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 356-374. Springer, Heidelberg (2008)
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and nonin- teractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
-
-
-
39
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
40
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R, ed, Springer, Heidelberg
-
Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
-
41
-
-
67049139430
-
-
Atluri, V, Patzmann, B, McDaniel, P.D, eds, Washingtion, DC, USA, October 25-29, ACM, New York () 2004
-
Atluri, V., Patzmann, B., McDaniel, P.D. (eds.): Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004. ACM, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS
-
-
-
42
-
-
79959292842
-
CRYPTO 2004
-
Franklin, M, ed, Springer, Heidelberg
-
Franklin, M. (ed.): CRYPTO 2004. LNCS, vol. 3152. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
-
-
|