-
1
-
-
35048841300
-
Efficient selective id secure identity based encryption without random oracles
-
Cachin, C, Camenisch, J.L, eds, EURO-CRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective id secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EURO-CRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
69949191549
-
Delegatable anonymous credentials
-
Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS. Springer, Heidelberg (2009)
-
(2009)
LNCS
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
4
-
-
40249111589
-
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 356-374. Springer, Heidelberg (2008)
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
0003153237
-
Non-interactive zero-knowledge and its applications (extended abstract)
-
Chicago, Illinois, May 2-4, pp
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC 1988, Chicago, Illinois, May 2-4, pp. 103-112 (1988)
-
(1988)
STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
6
-
-
85032877754
-
New paradigms for digital signatures and message authentication based on non-interative zero knowledge
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Bellare, M., Goldwasser, S.: New paradigms for digital signatures and message authentication based on non-interative zero knowledge. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 194-211. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 194-211
-
-
Bellare, M.1
Goldwasser, S.2
-
7
-
-
24144433396
-
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
9
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
Technical Report CS-R9323, CWI April
-
Brands, S.: An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI (April 1993)
-
(1993)
-
-
Brands, S.1
-
10
-
-
37149007674
-
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 1-15. Springer, Heidelberg (2007)
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
58349085879
-
Efficient protocols for set membership and range proofs
-
Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
-
Camenisch, J., Chaabouni, R., Shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234-252. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 234-252
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
12
-
-
84929273746
-
Untraceable electronic cash
-
Gold-wasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Gold-wasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319-327. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
13
-
-
85181646741
-
-
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) CRYPTO 1982, pp. 199-203. Plenum Press, New York (1999)
-
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) CRYPTO 1982, pp. 199-203. Plenum Press, New York (1999)
-
-
-
-
14
-
-
34547379480
-
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: CCS 2006, pp. 201-210. ACM Press, New York (2006)
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: CCS 2006, pp. 201-210. ACM Press, New York (2006)
-
-
-
-
15
-
-
24944435537
-
Compact E-cash
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
16
-
-
23944509128
-
-
Camenisch, J., Koprowski, M., Warinschi, B.: Efficient blind signatures without random oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 134-148. Springer, Heidelberg (2005)
-
Camenisch, J., Koprowski, M., Warinschi, B.: Efficient blind signatures without random oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 134-148. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
38049112331
-
Simulatable vrfs with applications to multitheorem nizk
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Chase, M., Lysyanskaya, A.: Simulatable vrfs with applications to multitheorem nizk. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 303-322. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 303-322
-
-
Chase, M.1
Lysyanskaya, A.2
-
18
-
-
34548777609
-
-
Camenisch, J., Lysyanskaya, A., Meyerovich, M.: Endorsed e-cash. In: IEEE Symposium on Security and Privacy, pp. 101-115 (2007)
-
Camenisch, J., Lysyanskaya, A., Meyerovich, M.: Endorsed e-cash. In: IEEE Symposium on Security and Privacy, pp. 101-115 (2007)
-
-
-
-
19
-
-
85059770931
-
-
Cook, S.A.: The complexity of theorem-proving procedures. In: STOC 1971, pp. 151-158. ACM, New York (1971)
-
Cook, S.A.: The complexity of theorem-proving procedures. In: STOC 1971, pp. 151-158. ACM, New York (1971)
-
-
-
-
20
-
-
84990195007
-
Transferred cash grows in size
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Transferred cash grows in size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390-407. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 390-407
-
-
Chaum, D.1
Pedersen, T.P.2
-
21
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Kaliski, B, ed, CRYPTO 1997, Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
22
-
-
24644493543
-
Proof systems for general statements about discrete logarithms
-
Institute for Theoretical Computer Science, ETH Zürich March
-
Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zürich (March 1997)
-
(1997)
Technical Report TR
, vol.260
-
-
Camenisch, J.1
Stadler, M.2
-
23
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
24
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Damgård, I.: Efficient concurrent zero-knowledge in the auxiliary string model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Damgård, I.1
-
26
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: STOC 1991, pp. 542-552 (1991)
-
(1991)
STOC 1991
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
27
-
-
24144481228
-
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 416-431. Springer, Heidelberg (2005)
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
-
-
-
28
-
-
84990731886
-
How to prove yourself: Practical solutions to identi-fication and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identi-fication and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
29
-
-
40249083661
-
A taxonomy of pairing-friendly elliptic curves. Cryptology ePrint Archive
-
Report 2006/372
-
Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. Cryptology ePrint Archive, Report 2006/372 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Freeman, D.1
Scott, M.2
Teske, E.3
-
30
-
-
84955560661
-
-
Frankel, Y., Tsiounis, Y., Yung, M.: Indirect discourse proofs: Achieving efficient fair off-line E-cash. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 286-300. Springer, Heidelberg (1996)
-
Frankel, Y., Tsiounis, Y., Yung, M.: Indirect discourse proofs: Achieving efficient fair off-line E-cash. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 286-300. Springer, Heidelberg (1996)
-
-
-
-
31
-
-
27644526725
-
Towards provably secure efficient electronic cash
-
CUSC-018-92, Columbia University, Dept. of Computer Science April, Also in: Lingas, A, Carlsson, S, Karlsson, R, eds, ICALP 1993. LNCS, 700. Springer, Heidelberg
-
Franklin, M., Yung, M.: Towards provably secure efficient electronic cash. Technical Report TR CUSC-018-92, Columbia University, Dept. of Computer Science (April 1992); Also in: Lingas, A., Carlsson, S., Karlsson, R. (eds.): ICALP 1993. LNCS, vol. 700. Springer, Heidelberg (1993)
-
(1992)
Technical Report TR
-
-
Franklin, M.1
Yung, M.2
-
32
-
-
0344550529
-
-
Goldwasser, S., Kalai, Y.T.: On the (in)security of the Fiat-Shamir paradigm. In: FOCS 2003, pp. 102-115. IEEE Computer Society Press, Los Alamitos (2003)
-
Goldwasser, S., Kalai, Y.T.: On the (in)security of the Fiat-Shamir paradigm. In: FOCS 2003, pp. 102-115. IEEE Computer Society Press, Los Alamitos (2003)
-
-
-
-
33
-
-
85008172715
-
Invariant signatures and non-interactive zero-knowledge proofs are equivalent
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Goldwasser, S., Ostrovsky, R.: Invariant signatures and non-interactive zero-knowledge proofs are equivalent. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 228-245. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 228-245
-
-
Goldwasser, S.1
Ostrovsky, R.2
-
35
-
-
84958591696
-
Security of blind digital signatures (extended abstract)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
36
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
37
-
-
0033346854
-
Verifiable random functions. In: FOCS
-
Los Alamitos
-
Micali, S., Rabin, M., Vadhan, S.: Verifiable random functions. In: FOCS 1999, pp. 120-130. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
120-130. IEEE Computer Society Press
, pp. 1999
-
-
Micali, S.1
Rabin, M.2
Vadhan, S.3
-
38
-
-
84974554584
-
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991, 576, pp. 433-444. Springer, Heidelberg (1992)
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
-
-
-
39
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS
-
Los Alamitos
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS 1999, pp. 543-553. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
543-553. IEEE Computer Society Press
, pp. 1999
-
-
Sahai, A.1
-
40
-
-
84957629646
-
Fair blind signatures
-
Guillou, L.C, Quisquater, J.-J, eds, EUROCRYPT 1995, Springer, Heidelberg
-
Stadler, M., Piveteau, J.-M., Camenisch, J.: Fair blind signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209-219. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.-M.2
Camenisch, J.3
-
41
-
-
84957055070
-
Auditable, anonymous electronic cash extended abstract
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Sander, T., Ta-Shma, A.: Auditable, anonymous electronic cash extended abstract. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 555-572. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 555-572
-
-
Sander, T.1
Ta-Shma, A.2
-
42
-
-
33646839647
-
A universally composable scheme for electronic cash
-
Maitra, S, Veni Madhavan, C.E, Venkatesan, R, eds, INDOCRYPT 2005, Springer, Heidelberg
-
Trolin, M.: A universally composable scheme for electronic cash. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 347-360. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3797
, pp. 347-360
-
-
Trolin, M.1
-
43
-
-
33745871113
-
-
Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 525-542. Springer, Heidelberg (2006)
-
Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 525-542. Springer, Heidelberg (2006)
-
-
-
|