-
1
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE J. Selected Areas in Comm. 18(4), 593-610 (2000)
-
(2000)
IEEE J. Selected Areas in Comm
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
2
-
-
40249111589
-
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: Non-interactive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 356-374. Springer, Heidelberg (2008)
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: Non-interactive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
-
-
-
3
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM, New York
-
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security 1993, pp. 62-73. ACM, New York (1993)
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
24144477851
-
-
Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 136-153. Springer, Heidelberg (2005)
-
Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136-153. Springer, Heidelberg (2005)
-
-
-
-
6
-
-
0003153237
-
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC 1988, pp. 103-112. ACM, New York (1988)
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC 1988, pp. 103-112. ACM, New York (1988)
-
-
-
-
7
-
-
11244339991
-
Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive
-
Report 2003/096
-
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive: Report 2003/096 (2003)
-
(2003)
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
8
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048887476
-
Short group signatures
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
10
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
11
-
-
24144433396
-
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
33746042155
-
Compact group signatures without random oracles
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Boyen, X., Waters, B.: Compact group signatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 427-444. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
37149007674
-
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 1-15. Springer, Heidelberg (2007)
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
85024290278
-
Group signatures
-
Davies, D.W, ed, EU-ROCRYPT 1991, Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EU-ROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
16
-
-
85028462775
-
Zero-knowledge proofs of knowledge without interaction. In: FOCS
-
Los Alamitos
-
De Santis, A., Persiano, G.: Zero-knowledge proofs of knowledge without interaction. In: FOCS 1992, pp. 427-436. IEEE Computer Society, Los Alamitos (1992)
-
(1992)
427-436. IEEE Computer Society
, pp. 1992
-
-
De Santis, A.1
Persiano, G.2
-
17
-
-
52149107370
-
-
Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 201-217. Springer, Heidelberg (2008)
-
Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201-217. Springer, Heidelberg (2008)
-
-
-
-
18
-
-
69949175420
-
Encrypting proofs on pairings and an application to anonymity of signatures (full version). Cryptology ePrint Archive
-
Report 2008/528
-
Fuchsbauer, G., Pointcheval, D.: Encrypting proofs on pairings and an application to anonymity of signatures (full version). Cryptology ePrint Archive, Report 2008/528 (2008), http://eprint.iacr.org/2008/528
-
(2008)
-
-
Fuchsbauer, G.1
Pointcheval, D.2
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
20
-
-
33749544769
-
Non-interactive zaps and new techniques for NIZK
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Non-interactive zaps and new techniques for NIZK. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 97-111. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 97-111
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
21
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
22
-
-
38149097733
-
Fully anonymous group signatures without random oracles
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Groth, J.: Fully anonymous group signatures without random oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164-180. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 164-180
-
-
Groth, J.1
-
23
-
-
77649262306
-
Simulation-sound NIZK proofs for a practical language and constant size group signatures
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
24
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
25
-
-
84957649548
-
Identity escrow
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Kilian, J., Petrank, E.: Identity escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169-185. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
26
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM, New York
-
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS). ACM, New York (1996)
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS)
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
27
-
-
35248818856
-
On cryptographic assumptions and challenges
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 96-109
-
-
Naor, M.1
-
28
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS
-
Los Alamitos
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS 1999, pp. 543-553. IEEE Computer Society, Los Alamitos (1999)
-
(1999)
543-553. IEEE Computer Society
, pp. 1999
-
-
Sahai, A.1
-
29
-
-
26444526650
-
Hierarchical group signatures
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Trolin, M., Wikström, D.: Hierarchical group signatures. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 446-458. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 446-458
-
-
Trolin, M.1
Wikström, D.2
-
30
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|