-
1
-
-
70350323950
-
Delegatable signatures
-
Bar01, Technical report, Weizmann Institute of Science
-
[Bar01] Barak, B.: Delegatable signatures. Technical report, Weizmann Institute of Science (2001)
-
(2001)
-
-
Barak, B.1
-
2
-
-
35048848152
-
Short signatures without random oracles
-
BB04, Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
[BB04] Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
BBG05, Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
[BBG05] Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
4
-
-
70350338179
-
-
[BCC+08] Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. Cryptology ePrint Archive, Report 2008/428 (2008), http://eprint.iacr.org/2008/428
-
[BCC+08] Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. Cryptology ePrint Archive, Report 2008/428 (2008), http://eprint.iacr.org/2008/428
-
-
-
-
5
-
-
40249111589
-
-
[BCKL08] Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 356-374. Springer, Heidelberg (2008)
-
[BCKL08] Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
-
-
-
6
-
-
1642276503
-
-
+99] Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H.: Divertible and subliminal-free zero-knowledge proofs for languages. Journal of Cryptology 12(3), 197-223 (1999)
-
+99] Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H.: Divertible and subliminal-free zero-knowledge proofs for languages. Journal of Cryptology 12(3), 197-223 (1999)
-
-
-
-
7
-
-
0026383119
-
Non-interactive zero-knowledge
-
BDMP91
-
[BDMP91] Blum, M., De Santis, A., Micali, S., Persiano, G.: Non-interactive zero-knowledge. SIAM Journal of Computing 20(6), 1084-1118 (1991)
-
(1991)
SIAM Journal of Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
De Santis, A.2
Micali, S.3
Persiano, G.4
-
8
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
BFM88
-
[BFM88] Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC 1988 (1988)
-
(1988)
STOC 1988
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
9
-
-
23044435711
-
Short signatures from the Weil pairing
-
BLS04
-
[BLS04] Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptology 17(4), 297-319 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
52149104493
-
-
[Boy08] Boyen, X.: The uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 39-56. Springer, Heidelberg (2008)
-
[Boy08] Boyen, X.: The uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
-
-
-
-
12
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Cha85
-
[Cha85] Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
13
-
-
34547379480
-
-
+06] Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: CCS 2006 (2006)
-
+06] Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: CCS 2006 (2006)
-
-
-
-
14
-
-
0013175080
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
CL01
-
[CL01] Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Eurocrypt 2001 (2001)
-
(2001)
Eurocrypt
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
CL02a, Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
[CL02a] Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
35248839965
-
-
[CL02b] Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
[CL02b] Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
17
-
-
33749578123
-
On signatures of knowledge
-
CL06, Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
[CL06] Chase, M., Lysyanskaya, A.: On signatures of knowledge. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 78-96. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 78-96
-
-
Chase, M.1
Lysyanskaya, A.2
-
18
-
-
84958612917
-
Efficient group signature schemes for large groups
-
CS97, Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
[CS97] Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
19
-
-
84864794192
-
-
Dam02
-
[Dam02] Damgård, I.: On σ-protocols (2002), http://www.daimi.au.dk/~ivan/Sigma.ps
-
(2002)
On σ-protocols
-
-
Damgård, I.1
-
20
-
-
85028916974
-
Cryptographic applications of the non-interactive metaproof and many-prover systems
-
DSY90, Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
[DSY90] De Santis, A., Yung, M.: Cryptographic applications of the non-interactive metaproof and many-prover systems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 366-377. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 366-377
-
-
De Santis, A.1
Yung, M.2
-
21
-
-
0342733642
-
Multiple noninteractive zero knowledge proofs under general assumptions
-
FLS99
-
[FLS99] Feige, U., Lapidot, D., Shamir, A.: Multiple noninteractive zero knowledge proofs under general assumptions. SIAM Journal on Computing 29(1), 1-28 (1999)
-
(1999)
SIAM Journal on Computing
, vol.29
, Issue.1
, pp. 1-28
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
22
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
GMR89
-
[GMR89] Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989)
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
24
-
-
33746072569
-
Perfect non-interactive zero knowledge for np
-
GOS06, Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
[GOS06] Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for np. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
25
-
-
38049084297
-
Pairings for cryptographers. Cryptology ePrint Archive
-
GPS06, Report 2006/165
-
[GPS06] Galbraith, S., Paterson, K., Smart, N.: Pairings for cryptographers. Cryptology ePrint Archive, Report 2006/165 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
26
-
-
70349557354
-
Hierarchical ID-based cryptography
-
GS02, Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
[GS02] Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
27
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
GS08, Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
[GS08] Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
29
-
-
67651053584
-
-
[LRSW99] Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, p. 184. Springer, Heidelberg (2000)
-
[LRSW99] Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, p. 184. Springer, Heidelberg (2000)
-
-
-
-
30
-
-
84974625311
-
Necessary and sufficient assumptions for non-interactive zero-knowledge proofs of knowledge for all NP relations
-
SCP00, Welzl, E, Montanari, U, Rolim, J.D.P, eds, ICALP 2000, Springer, Heidelberg
-
[SCP00] De Santis, A., Di Crescenzo, G., Persiano, G.: Necessary and sufficient assumptions for non-interactive zero-knowledge proofs of knowledge for all NP relations. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, p. 451. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1853
, pp. 451
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
|