-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
V. Shoup, editor, Advances in Cryptology, CRYPTO 2005, of, Springer Verlag
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 205-222. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare, editor, Advances in Cryptology, CRYPTO 2000, of, Springer Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
35048887476
-
Short group signatures
-
M. K. Franklin, editor, Advances in Cryptology, CRYPTO 2004, of, Springer Verlag
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
4
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
B. Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer Verlag
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 431-444. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
5
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
Technical Report CS-R9323, CWI, Apr
-
S. Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, Apr. 1993.
-
(1993)
-
-
Brands, S.1
-
6
-
-
54349111494
-
Restrictive blinding of secret-key certificates
-
Technical Report CS-R9509, CWI, Sept
-
S. Brands. Restrictive blinding of secret-key certificates. Technical Report CS-R9509, CWI, Sept. 1995.
-
(1995)
-
-
Brands, S.1
-
7
-
-
54349111494
-
Secret-key certificates
-
Technical Report CS-R9510, CWI, Sept
-
S. Brands. Secret-key certificates. Technical Report CS-R9510, CWI, Sept. 1995.
-
(1995)
-
-
Brands, S.1
-
8
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
W. Fumy, editor, Advances in Cryptology, EUROCRYPT '97, of, Springer Verlag
-
S. Brands. Rapid demonstration of linear relations connected by boolean operators. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 318-333. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
10
-
-
24944435537
-
Compact E-cash
-
R. Cramer, editor, Advances in Cryptology, Eurocrypt 2005, of, Springer
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact E-cash. In R. Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 302-321. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
11
-
-
70349247214
-
Public key encryption with oblivious keyword search and its application to data retention
-
3708, IBM Research, May
-
J. Camenisch, M. Kohlweiss, A. R. Durán, and C. Sheedy. Public key encryption with oblivious keyword search and its application to data retention. IBM Research Report RZ 3708, IBM Research, May 2008. http://domino.research. ibm.com/library/cyberdig.nsf/index.html.
-
(2008)
IBM Research Report RZ
-
-
Camenisch, J.1
Kohlweiss, M.2
Durán, A.R.3
Sheedy, C.4
-
12
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
B. Pfitzmann, editor, Advances in Cryptology, EUROCRYPT 2001, of, Springer Verlag
-
J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
35248839965
-
A signature scheme with efficient protocols
-
S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, of, Springer Verlag
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
M. K. Franklin, editor, Advances in Cryptology, CRYPTO 2004, of, Springer Verlag
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 56-72. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
70349242589
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
Technical Report RS-98-29, BRICS, Departement of Computer Science, University of Aarhus, Nov
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. Technical Report RS-98-29, BRICS, Departement of Computer Science, University of Aarhus, Nov. 1998.
-
(1998)
-
-
Camenisch, J.1
Michels, M.2
-
16
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, of, Springer Verlag
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 107-122. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
17
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
M. Wiener, editor, Advances in Cryptology, CRYPTO '99, of, Springer Verlag
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 413-430. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
18
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
D. Boneh, editor, Advances in Cryptology, CRYPTO 2003, of
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 126-144, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
19
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B. Kaliski, editor, Advances in Cryptology, CRYPTO '97, of, Springer Verlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1296 of Lecture Notes in Computer Science, pages 410-424. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
21
-
-
84957661460
-
Easy come - easy go divisible cash
-
K. Nyberg, editor, Advances in Cryptology, EUROCRYPT '98, of, Springer Verlag
-
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 561-575. Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
22
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
23
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Plenum Press
-
D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology - Proceedings of CRYPTO '82, pages 199-203. Plenum Press, 1983.
-
(1983)
Advances in Cryptology - Proceedings of CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
24
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct. 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
25
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer-Verlag
-
D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 118-167. Springer-Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
26
-
-
85001025766
-
Wallet databases with observers
-
E. F. Brickell, editor, Advances in Cryptology, CRYPTO '92, of, Springer-Verlag
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
27
-
-
85024290278
-
Group signatures
-
D. W. Davies, editor, Advances in Cryptology, EUROCRYPT '91, of, Springer-Verlag
-
D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
28
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. G. Desmedt, editor, Advances in Cryptology, CRYPTO '94, of, Springer Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
30
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. M. Odlyzko, editor, Advances in Cryptology, CRYPTO '86, of, Springer Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
31
-
-
84947809856
-
Fair off-line e-cash made easy
-
K. Kim and T. Matsumoto, editors, Advances in Cryptology, ASIACRYPT '98, of, Springer Verlag
-
Y. Frankel, Y. Tsiounis, and M. Yung. Fair off-line e-cash made easy. In K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT '98, volume 1514 of Lecture Notes in Computer Science, pages 257-270. Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 257-270
-
-
Frankel, Y.1
Tsiounis, Y.2
Yung, M.3
-
32
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
J. Seberry and Y. Zheng, editors, ASIACRYPT, of, Springer
-
A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In J. Seberry and Y. Zheng, editors, ASIACRYPT, volume 718 of Lecture Notes in Computer Science, pages 244-251. Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
33
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
B. Kaliski, editor, Advances in Cryptology, CRYPTO '97, of, Springer Verlag
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 16-30. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
34
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
M. Green and S. Hohenberger. Blind identity-based encryption and simulatable oblivious transfer. In ASIACRYPT, pages 265-282, 2007.
-
(2007)
ASIACRYPT
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
35
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
A. Kiayias and M. Yung. Secure scalable group signature with dynamic joins and separable authorities. IJSN, 1(1/2):24-45, 2006.
-
(2006)
IJSN
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
36
-
-
35048841283
-
Traceable signatures
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, of, Springer
-
A. Kiayias, M. Yung, and Y. Tsiounis. Traceable signatures. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Yung, M.2
Tsiounis, Y.3
-
38
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, editor, Advances in Cryptology, CRYPTO '91, of, Springer Verlag
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
39
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
40
-
-
12344258539
-
Efficient signature generation for smart cards
-
C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
|