-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Springer, Heidelberg (2000), In: Bellare, M. (ed.). LNCS
-
Ateniese, G., Camenisch, J.L., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.1880, p. 255. Springer, Heidelberg (2000)
-
(2000)
CRYPTO 2000
, vol.1880
, pp. 255
-
-
Ateniese, G.1
Camenisch, L.J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
67650688025
-
Remarks on analysis of one popular group signature scheme in asiacrypt 2006
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: Remarks on "analysis of one popular group signature scheme" in asiacrypt 2006. Cryptology ePrint Archive, Report 2006/464 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive, Report 2006/464
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84957043547
-
Quasi-efficient revocation in group signatures
-
Springer, Heidelberg (2003), In: Blaze, M. (ed.). LNCS
-
Ateniese, G., Song, D.X., Tsudik, G.: Quasi-efficient revocation in group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol.2357, pp. 183-197. Springer, Heidelberg (2003)
-
(2003)
FC 2002
, vol.2357
, pp. 183-197
-
-
Ateniese, G.1
Song, X.D.2
Tsudik, G.3
-
4
-
-
67650676702
-
On efficient zero-knowledge proofs of knowledge
-
Bangerter, E.: On Efficient Zero-Knowledge Proofs of Knowledge. PhD thesis, Ruhr U. Bochum (2005)
-
(2005)
PhD thesis Ruhr U. Bochum
-
-
Bangerter, E.1
-
5
-
-
24144462516
-
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Bangerter, E., Camenisch, J.L.,Maurer, U.M.: Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.3386, pp. 154-171. Springer, Heidelberg (2005), http://www.zurich.ibm.com/~/jca/papers/bacama05.pdf (Pubitemid 41231329)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 154-171
-
-
Bangerter, E.1
Camenisch, J.2
Maurer, U.3
-
6
-
-
84983104598
-
On Defining Proofs of Knowledge
-
Springer, Heidelberg (1993), In: Brickell, E.F. (ed.). LNCS
-
Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
7
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Springer, Heidelberg (2000), In: Preneel, B. (ed.). LNCS
-
Boudot, F.: Efficient Proofs that a Committed Number Lies in an Interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
8
-
-
84937429196
-
Efficient Revocation in Group Signatures
-
Public Key Cryptography
-
Bresson, E., Stern, J.: Efficient revocation in group signatures. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.1992, pp. 190-206. Springer, Heidelberg (2001) (Pubitemid 33232943)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
9
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York (2004)
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. 11th ACM Conference on Computer and Communications Security, pp. 225-234. ACM Press, New York (2004)
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security
, pp. 225-234
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
10
-
-
35048847964
-
History-based signature or how to trust anonymous documents
-
In: Jensen C. Poslad S. Dimitrakos T. (eds.). LNCS, Springer, Heidelberg (2004)
-
Bussard, L., Molva, R., Roudier, Y.: History-Based Signature or How to Trust Anonymous Documents. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.2995, pp. 78-92. Springer, Heidelberg (2004)
-
(2004)
iTrust 2004
, vol.2995
, pp. 78-92
-
-
Bussard, L.1
Molva, R.2
Roudier, Y.3
-
11
-
-
2942616805
-
Untraceable secret credentials Trust establishment with privacy
-
IEEE Computer Society, Los Alamitos (2004)
-
Bussard, L., Roudier, Y., Molva, R.: Untraceable secret credentials: Trust establishment with privacy. In: PerComWorkshops, pp. 122-126. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
PerComWorkshops
, pp. 122-126
-
-
Bussard, L.1
Roudier, Y.2
Molva, R.3
-
12
-
-
67650688024
-
On the portability of generalized schnorr proofs
-
Camenisch, J., Kiayias, A., Yung, M.: On the portability of generalized schnorr proofs. Technical report, Cryptology ePrint Archive (2009)
-
(2009)
Technical Report, Cryptology ePrint Archive (2009)
-
-
Camenisch, J.1
Kiayias, A.2
Yung, M.3
-
13
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Camenisch, J.L., Shoup, V.: Practical Verifiable Encryption and Decryption of Discrete Logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003) (Pubitemid 137636939)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
14
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Springer, Heidelberg (1997), In: Kaliski Jr., B.S. (ed.). LNCS
-
Camenisch, J.L., Stadler, M.A.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
CRYPTO 1997
, vol.1294
, pp. 410-424
-
-
Camenisch, L.J.1
Stadler, A.M.2
-
16
-
-
77649256729
-
Analysis of one popular group signature scheme
-
Springer, Heidelberg (2006), In: Lai, X., Chen, K. (eds.) . LNCS
-
Cao, Z.: Analysis of One Popular Group Signature Scheme. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 460-466. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 460-466
-
-
Cao, Z.1
-
17
-
-
84957661460
-
Easy come - Easy go divisible cash
-
Springer, Heidelberg (1998), In: Nyberg, K. (ed.). LNCS
-
Chan, A.H., Frankel, Y., Tsiounis, Y.: Easy Come - Easy Go Divisible Cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.1403, pp. 561-575. Springer, Heidelberg (1998)
-
(1998)
EUROCRYPT 1998
, vol.1403
, pp. 561-575
-
-
Chan, H.A.1
Frankel, Y.2
Tsiounis, Y.3
-
19
-
-
85024261619
-
Signature schemes based on the strong rsa assumption
-
Inf. Syst. Secur.
-
Cramer, R., Shoup, V.: Signature schemes based on the strong rsa assumption. ACM Trans. Inf. Syst. Secur. 3(3), 161-185 (2000)
-
(2000)
ACM Trans
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
20
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Springer, Heidelberg (2000), In: Preneel, B. (ed.). LNCS
-
Damg°ard, I.B.: Efficient concurrent zero-knowledge in the auxiliary string model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 418-430. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 418-430
-
-
Damgard, B.I.1
-
21
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
Springer, Heidelberg (2002), In: Zheng, Y. (ed.). LNCS
-
Damg°ard, I.B., Fujisaki, E.: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.2501, pp. 125-142. Springer, Heidelberg (2002)
-
(2002)
ASIACRYPT 2002
, vol.2501
, pp. 125-142
-
-
Damgard, B.I.1
Fujisaki, E.2
-
22
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer, Heidelberg (1987), In: Odlyzko, A.M. (ed.). LNCS
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
CRYPTO 1986
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
23
-
-
84958615646
-
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
-
Advances in Cryptology - CRYPTO '97
-
Fujisaki, E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 16-30. Springer, Heidelberg (1997) (Pubitemid 127112542)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
24
-
-
23944476940
-
Group signatures with separate and distributed authorities
-
Security in Communication Networks - 4th International Conference, SCN 2004
-
Furukawa, J., Yonezawa, S.: Group Signatures with Separate and Distributed Authorities. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.3352, pp. 77-90. Springer, Heidelberg (2005) (Pubitemid 41190998)
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 77-90
-
-
Furukawa, J.1
Yonezawa, S.2
-
25
-
-
33646074217
-
On the anonymity of fair offline e-cash systems
-
Springer, Heidelberg (2003), In: Wright, R.N. (ed.). LNCS
-
Gaud, M., Traoŕe, J.: On the Anonymity of Fair Offline E-cash Systems. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.2742, pp. 34-50. Springer, Heidelberg (2003)
-
(2003)
FC 2003
, vol.2742
, pp. 34-50
-
-
Gaud, M.1
Traore, J.2
-
26
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York (1987)
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC 1987: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218- 229. ACM Press, New York (1987)
-
(1987)
STOC 1987: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing
, vol.1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
28
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
29
-
-
33745851054
-
Cryptanalysis of an efficient proof of knowledge of discrete logarithm
-
DOI 10.1007/11745853-3, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
Kunz-Jacques, S., Martinet, G., Poupard, G., Stern, J.: Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.3958, pp. 27-43. Springer, Heidelberg (2006) (Pubitemid 44029573)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958
, pp. 27-43
-
-
Kunz-Jacques, S.1
Martinet, G.2
Poupard, G.3
Stern, J.4
-
30
-
-
84956853783
-
How to prove that a committed number is prime
-
Springer, Heidelberg (1999), In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) . LNCS
-
Van Le, T., Nguyen, K.Q., Varadharajan, V.: How to Prove That a Committed Number Is Prime. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.1716, pp. 208-218. Springer, Heidelberg (1999)
-
(1999)
ASIACRYPT 1999
, vol.1716
, pp. 208-218
-
-
Van Le, T.1
Nguyen, Q.K.2
Varadharajan, V.3
-
31
-
-
84958062532
-
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
-
Financial Cryptography
-
Lysyanskaya, A., Ramzan, Z.: Group Blind Digital Signatures: A Scalable Solution to Electronic Cash. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.1465, pp. 184-197. Springer, Heidelberg (1998) (Pubitemid 128122246)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1465
, pp. 184-197
-
-
Lysyanskaya, A.1
Ramzan, Z.2
-
32
-
-
84880864572
-
Two-party generation of DSA signatures
-
Springer, Heidelberg (2001), In: Kilian, J. (ed.). LNCS
-
MacKenzie, P.D., Reiter, M.K.: Two-party generation of DSA signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 137-154. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 137-154
-
-
MacKenzie, D.P.1
Reiter, K.M.2
-
33
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Mykletun, E., Narasimha, M., Tsudik, G.: Signature Bouquets: Immutability for Aggregated/ Condensed Signatures. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.3193, pp. 160-176. Springer, Heidelberg (2004) (Pubitemid 39738739)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3193
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
34
-
-
27844514431
-
An efficient online electronic cash with unlinkable exact payments
-
Nakanishi, T., Shiota, M., Sugiyama, Y.: An Efficient Online Electronic Cash with Unlinkable Exact Payments. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.3225, pp. 367- 378. Springer, Heidelberg (2004) (Pubitemid 39738677)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3225
, pp. 367-378
-
-
Nakanishi, T.1
Shiota, M.2
Sugiyama, Y.3
-
35
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
36
-
-
85013891306
-
Noninteractive zero-knowledge proof systems
-
Springer, Heidelberg (1988), In: Pomerance, C. (ed.) . LNCS
-
De Santis, A., Micali, S., Persiano, G.: Noninteractive Zero-Knowledge Proof Systems. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.293, pp. 52-72. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987
, vol.293
, pp. 52-72
-
-
Santis, D.A.1
Micali, S.2
Persiano, G.3
-
37
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, P.C.1
-
39
-
-
26444601090
-
On the security of nominative signatures
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
Susilo,W., Mu, Y.: On the Security of Nominative Signatures. In: Boyd, C., Gonźalez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.3574, pp. 329-335. Springer, Heidelberg (2005) (Pubitemid 41431792)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 329-335
-
-
Susilo, W.1
Mu, Y.2
-
40
-
-
67650693678
-
A verifiable secret sharing scheme with statistical zeroknowledge
-
Tang, C., Liu, Z., Wang, M.: A verifiable secret sharing scheme with statistical zeroknowledge. Cryptology ePrint Archive, Report 2003/222 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology ePrint Archive, Report 2003/222
-
-
Tang, C.1
Liu, Z.2
Wang, M.3
-
41
-
-
24644461219
-
Short linkable ring signatures for E-voting, E-cash and attestation
-
Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
-
Tsang, P.P.,Wei, V.K.: Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol.3439, pp. 48-60. Springer, Heidelberg (2005) (Pubitemid 41273777)
-
(2005)
Lecture Notes in Computer Science
, vol.3439
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
42
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable Linkable Threshold Ring Signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.3348, pp. 384-398. Springer, Heidelberg (2004) (Pubitemid 39748322)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
43
-
-
33646002029
-
Tracing-by-linking group signatures
-
Springer, Heidelberg (2005), In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) . LNCS
-
Wei, V.K.: Tracing-by-linking group signatures. In: Zhou, J., Ĺopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.3650, pp. 149-163. Springer, Heidelberg (2005)
-
(2005)
ISC 2005
, vol.3650
, pp. 149-163
-
-
Wei, K.V.1
|