-
1
-
-
38049027731
-
Perfect NIZK with Adaptive Soundness
-
M. Abe, S. Fehr. Perfect NIZK with Adaptive Soundness. In TCC, pp. 118 136, 2007.
-
(2007)
TCC
, vol.136
, pp. 118
-
-
Abe, M.1
Fehr, S.2
-
2
-
-
84947237328
-
On the security of joint signature and encryption
-
J.-H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In EUROCRYPT, pp. 83 107, 2002.
-
(2002)
EUROCRYPT
, vol.107
, pp. 83
-
-
An, J.-H.1
Dodis, Y.2
Rabin, T.3
-
3
-
-
33745213464
-
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
-
G. Atcniesc, K. Fu, M. Green, S. Hohenbcrgcr. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS, 2005.
-
(2005)
NDSS
-
-
Atcniesc, G.1
Fu, K.2
Green, M.3
Hohenbcrgcr, S.4
-
4
-
-
33745218758
-
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
-
G. Atcniese, K. Fir, M. Green, S. Hohenbcrgcr. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In ACM TISSEC, 9(1): pp. 1 30, 2006.
-
(2006)
ACM TISSEC
, vol.9
, Issue.1
, pp. 1-30
-
-
Atcniese, G.1
Fir, K.2
Green, M.3
Hohenbcrgcr, S.4
-
5
-
-
33745782314
-
Proxy re-signatures: New definitions, algorithms, and applications
-
G. Ateniese, S. Hohenberger. Proxy re-signatures: new definitions, algorithms, and applications. In ACM CCS'05, pp. 310 319, 2005.
-
(2005)
ACM CCS'05
, pp. 310-319
-
-
Ateniese, G.1
Hohenberger, S.2
-
6
-
-
34547339273
-
Multi-signatures in the plain public-Key model and a general forking lemma
-
M. Bellare, G. Neven. Multi-signatures in the plain public-Key model and a general forking lemma. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Bellare, M.1
Neven, G.2
-
7
-
-
35048881545
-
The knowlcdgc-of-cxponcut assumptions and 3-round zero-knowledge protocols
-
M. Bellare. A. Palacio. The knowlcdgc-of-cxponcut assumptions and 3-round zero-knowledge protocols. In CRYPTO, pp. 273 289, 2004.
-
(2004)
CRYPTO
, vol.289
, pp. 273
-
-
Bellare, M.1
Palacio, A.2
-
8
-
-
35048836178
-
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
-
M. Bellare, A. Palacio. Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. In ASIACRYPT, pp. 48 62, 2004.
-
(2004)
ASIACRYPT
, vol.62
, pp. 48
-
-
Bellare, M.1
Palacio, A.2
-
9
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare. P. R,ogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, pp. 62 73, 1993.
-
(1993)
ACM CCS
, vol.73
, pp. 62
-
-
Bellare, M.1
ogaway, P.R.2
-
10
-
-
84957718934
-
Divertible Protocols and Atomic Proxy Cryptography
-
M. Blaze, G. Bleumer, M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In EUROCRYPT, pp. 127 144. 1998.
-
(1998)
EUROCRYPT
, vol.144
, pp. 127
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
11
-
-
0842304790
-
Efficient Threshold Signature. Multisignature and Blind Signature Schemes Based on the Gap-Difne-Hellnian-group Signature Scheme
-
A. Boldyreva. Efficient Threshold Signature. Multisignature and Blind Signature Schemes Based on the Gap-Difne-Hellnian-group Signature Scheme. In PKC, pp. 31 46, 2003.
-
(2003)
PKC
, vol.46
, pp. 31
-
-
Boldyreva, A.1
-
12
-
-
35048841300
-
Efficient sclcctivc-ID secure identity based encryption without random oracles
-
D. Bonch, X. Boyen. Efficient sclcctivc-ID secure identity based encryption without random oracles. In EUR.OCR.YPT, pp. 223 238, 2004.
-
(2004)
EUR.OCR.YPT
, pp. 223-238
-
-
Bonch, D.1
Boyen, X.2
-
13
-
-
84946840347
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, H. Shacham. Short signatures from the Weil pairing. In ASIACRYPT, pp. 514-532, 2002.
-
(2002)
ASIACRYPT
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
77952361637
-
Choscn-Ciphertcxt Secure Proxy Re-Encryption
-
R. Canctti, S. Hohenberger. Choscn-Ciphertcxt Secure Proxy Re-Encryption. In ACM CCS, pp. 185-194, 2007.
-
(2007)
ACM CCS
, pp. 185-194
-
-
Canctti, R.1
Hohenberger, S.2
-
15
-
-
84921068281
-
On the exact security of Full Domain Hash
-
J.-S. Coron. On the exact security of Full Domain Hash. In CRYPTO, pp. 229 235, 2000.
-
(2000)
CRYPTO
, vol.235
, pp. 229
-
-
Coron, J.-S.1
-
16
-
-
85029541173
-
Towards Practical Public Key Systems Secure Against Chosen Ciphertcxt Attacks
-
I. Damgard: Towards Practical Public Key Systems Secure Against Chosen Ciphertcxt Attacks. In CRYPTO, pp. 445 456, 1991.
-
(1991)
CRYPTO
, vol.456
, pp. 445
-
-
Damgard, I.1
-
18
-
-
26844570979
-
Proxy Cryptography Revisited
-
Y. Dodis, A.-A. Ivan. Proxy Cryptography Revisited. In NDSS'OS, 2003.
-
(2003)
NDSS'OS
-
-
Dodis, Y.1
Ivan, A.-A.2
-
19
-
-
33749564652
-
On Computing Products of Pairings. Cryptology ePrint Archive
-
Report 2006/172
-
R. Granger, N. P. Smart. On Computing Products of Pairings. Cryptology ePrint Archive: Report 2006/172, 2006.
-
(2006)
-
-
Granger, R.1
Smart, N.P.2
-
20
-
-
38049061546
-
Identity-Based Proxy Re-encryption
-
M. Green, G. Ateniese. Identity-Based Proxy Re-encryption. In ACNS, pp. 288 306, 2007.
-
(2007)
ACNS
, vol.306
, pp. 288
-
-
Green, M.1
Ateniese, G.2
-
21
-
-
70349276304
-
Advances in Signatures, Encryption, and E-Cash from Bilinear Groups
-
May
-
S. Hohenberger. Advances in Signatures, Encryption, and E-Cash from Bilinear Groups. Ph.D. Thesis, MIT, May 2006.
-
(2006)
MIT
-
-
Hohenberger, S.1
-
22
-
-
38049073133
-
Securely Obfuscating Re-encryption
-
S. Hohenberger, G. N. Rothblum, a. shclat, V. Vaikuntanathan. Securely Obfuscating Re-encryption. In TCC, pp. 233 252, 2007.
-
(2007)
TCC
, vol.252
, pp. 233
-
-
Hohenberger, S.1
Rothblum, G.N.2
shclat, A.3
Vaikuntanathan, V.4
-
23
-
-
33750015293
-
About the Security of MTI/C0 and MQV
-
S. Kunz-Jacqucs. D. Pointcheval. About the Security of MTI/C0 and MQV. In SCN, pp. 156-172, 2006.
-
(2006)
SCN
, pp. 156-172
-
-
Kunz-Jacqucs, S.1
Pointcheval, D.2
-
24
-
-
70349279525
-
Multi-Use Unidirectional Proxy Re-Signatures
-
Available from
-
B. Libert, D. Vergnaud. Multi-Use Unidirectional Proxy Re-Signatures. In Computing Research Repository. Available from http://arxiv.org/abs/0802. 1113.
-
Computing Research Repository
-
-
Libert, B.1
Vergnaud, D.2
-
25
-
-
33746066354
-
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacharn, B. Waters. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In EUROCRYPT, pp. 465 485, 2006.
-
(2006)
EUROCRYPT
, vol.485
, pp. 465
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacharn, H.4
Waters, B.5
-
26
-
-
0029717329
-
Proxy Signatures for Delegating Signing Operation
-
M. Mambo, K. Usuda, E. Okamoto. Proxy Signatures for Delegating Signing Operation. In ACM CCS, pp. 48-57, 1996.
-
(1996)
ACM CCS
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
27
-
-
35248818856
-
On Cryptographic Assumptions and Challenges
-
M. Naor. On Cryptographic Assumptions and Challenges. In CRYPTO, pp. 96 109, 2003.
-
(2003)
CRYPTO
, vol.109
, pp. 96
-
-
Naor, M.1
-
28
-
-
78651384186
-
The Power of Proofs of Possession: Securing Multiparty Signatures Against Rogue Key Attacks
-
T. Ristenpart, S. Y'ilek. The Power of Proofs of Possession: Securing Multiparty Signatures Against Rogue Key Attacks. In EUROCRYPT, pp. 246-263, 2007.
-
(2007)
EUROCRYPT
, pp. 246-263
-
-
Ristenpart, T.1
Y'ilek, S.2
-
29
-
-
38349051240
-
Proxy Re-Signature Schemes without Random Oracles
-
J. Shao, Z. Cao, L. Wang, X. Liang. Proxy Re-Signature Schemes without Random Oracles. In INDOCRYPT, pp. 197-209, 2007.
-
(2007)
INDOCRYPT
, pp. 197-209
-
-
Shao, J.1
Cao, Z.2
Wang, L.3
Liang, X.4
-
30
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO, pp. 239 252, 1989.
-
(1989)
CRYPTO
, vol.252
, pp. 239
-
-
Schnorr, C.P.1
-
31
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
B. Waters. Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT, pp. 114 127, 2005.
-
(2005)
EUROCRYPT
, vol.127
, pp. 114
-
-
Waters, B.1
|