-
2
-
-
0033279983
-
Anonymous authentication with subset queries
-
ACM Press
-
Boneh D., and Franklin M. Anonymous authentication with subset queries. Proceedings of 6th ACM-CCS (1999), ACM Press 73-82
-
(1999)
Proceedings of 6th ACM-CCS
, pp. 73-82
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
CRYPTO 2001, Springer-Verlag
-
Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. CRYPTO 2001. LNCS vol. 2139 (2001), Springer-Verlag 213-229
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
EUROCRYPT 2000, Springer-Verlag
-
Boudot F. Efficient proofs that a committed number lies in an interval. EUROCRYPT 2000. LNCS vol. 1807 (2000), Springer-Verlag 431-444
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
5
-
-
84957661460
-
Easy come - easy go divisible cash
-
EUROCRYPT 1998, Springer-Verlag
-
Chan A., Frankel Y., and Tsiounis Y. Easy come - easy go divisible cash. EUROCRYPT 1998. LNCS vol. 1403 (1998), Springer-Verlag 561-575
-
(1998)
LNCS
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
6
-
-
35048854233
-
Anonymous identification in Ad Hoc groups
-
EUROCRYPT 2004, Springer-Verlag
-
Dodis Y., Kiayias A., Nicolosi A., and Shoup V. Anonymous identification in Ad Hoc groups. EUROCRYPT 2004. LNCS vol. 3027 (2004), Springer-Verlag 609-626
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
7
-
-
84990731886
-
How to prove yourself: practical solutions to identification and signature problems
-
CRYPTO 1986, Springer-Verlag
-
Fiat A., and Shamir A. How to prove yourself: practical solutions to identification and signature problems. CRYPTO 1986. LNCS vol. 263 (1987), Springer-Verlag 186-194
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
8
-
-
0023569922
-
Zero knowledge proofs of identity
-
U. Feige, A. Fiat, A. Shamir, Zero knowledge proofs of identity, in: STOC'87, 1987, pp. 210-217
-
(1987)
STOC'87
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
23044528649
-
Design and security analysis of anonymous group identification protocols
-
PKC 2002, Springer-Verlag
-
Lee C.H., Deng X., and Zhu H. Design and security analysis of anonymous group identification protocols. PKC 2002. LNCS vol. 2274 (2002), Springer-Verlag 188-198
-
(2002)
LNCS
, vol.2274
, pp. 188-198
-
-
Lee, C.H.1
Deng, X.2
Zhu, H.3
-
11
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
CT-RSA 2005, Springer-Verlag
-
Nguyen L. Accumulators from bilinear pairings and applications. CT-RSA 2005. LNCS vol. 3376 (2005), Springer-Verlag 275-292
-
(2005)
LNCS
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
13
-
-
0032218230
-
Communication-efficient anonymous group identification
-
A.D. Santis, G.D. Crescenzo, G. Persiano, Communication-efficient anonymous group identification, in: Proceedings of 5th ACM-CCS, 1998, pp. 73-82
-
(1998)
Proceedings of 5th ACM-CCS
, pp. 73-82
-
-
Santis, A.D.1
Crescenzo, G.D.2
Persiano, G.3
-
14
-
-
84958950087
-
On monotone formula closure of SZK
-
A.D. Santis, G.D. Crescenzo, G. Persiano, M. Yung, On monotone formula closure of SZK, in: FOCS'94, 1994, pp. 454-465
-
(1994)
FOCS'94
, pp. 454-465
-
-
Santis, A.D.1
Crescenzo, G.D.2
Persiano, G.3
Yung, M.4
-
15
-
-
57349104431
-
Analysis of bilinear pairing-based accumulator for identity escrowing
-
Tartary C., Zhou S., Lin D., Wang H., and Pieprzyk J. Analysis of bilinear pairing-based accumulator for identity escrowing. Information Security, IET 2 4 (2008) 99-107
-
(2008)
Information Security, IET
, vol.2
, Issue.4
, pp. 99-107
-
-
Tartary, C.1
Zhou, S.2
Lin, D.3
Wang, H.4
Pieprzyk, J.5
|