-
1
-
-
84948973732
-
Efficient Proofs that a Committed Number Lies in an Interval
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Boudot, F.: Efficient Proofs that a Committed Number Lies in an Interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
2
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
3
-
-
84958769452
-
Convertible undeniable signatures
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Boyar, J., Chaum, D., Damgard, I., Pedersen, T.: Convertible undeniable signatures. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 189-205. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgard, I.3
Pedersen, T.4
-
4
-
-
84947906522
-
The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0010252194
-
Undeniable signatures
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
van Antwerpen, H.2
-
6
-
-
84947955350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Chaum, D., van Heijst, E., Pfitzmann, B.: Cryptographically strong undeniable signatures, unconditionally secure for the signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470-484. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 470-484
-
-
Chaum, D.1
van Heijst, E.2
Pfitzmann, B.3
-
7
-
-
44449176564
-
The Twin Dime-Hellman Problem and Applications
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Cash, D., Kiltz, E., Shoup, V.: The Twin Dime-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
8
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Chaum, T., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, T.1
Pedersen, T.P.2
-
9
-
-
84921068281
-
On the Exact Security of Full Domain Hash
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Coron, J.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.1
-
10
-
-
84958774556
-
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Damgard, I., Fujisaki, E.: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125-142. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 125-142
-
-
Damgard, I.1
Fujisaki, E.2
-
11
-
-
84947933505
-
New convertible undeniable signature schemes
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Damgard, I., Pedersen, T.: New convertible undeniable signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 372-386. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 372-386
-
-
Damgard, I.1
Pedersen, T.2
-
12
-
-
84958615646
-
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
84957661041
-
Secure Hash-and-Sign Signatures Without the Random Oracle
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Gennaro, R., Halevi, S., Rabin, T.: Secure Hash-and-Sign Signatures Without the Random Oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
14
-
-
35248865251
-
-
Galbraith, S., Mao, W.: Invisibility and anonymity of undeniable and confirmer signatures. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 80-97. Springer, Heidelberg (2003)
-
Galbraith, S., Mao, W.: Invisibility and anonymity of undeniable and confirmer signatures. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 80-97. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
84944870499
-
-
Galbraith, S., Mao, W., Paterson, K.G.: RSA-based undeniable signatures for general moduli. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 200-217. Springer, Heidelberg (2002)
-
Galbraith, S., Mao, W., Paterson, K.G.: RSA-based undeniable signatures for general moduli. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 200-217. Springer, Heidelberg (2002)
-
-
-
-
16
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. Journal of Cryptology 7(1), 1-32 (1994)
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
17
-
-
0012081094
-
RSA-based undeniable signatures
-
Gennaro, R., Rabin, T., Krawczyk, H.: RSA-based undeniable signatures. Journal of Cryptology 13(4), 397-416 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.4
, pp. 397-416
-
-
Gennaro, R.1
Rabin, T.2
Krawczyk, H.3
-
18
-
-
51849152334
-
Programmable Hash Functions and Their Applications
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Programmable Hash Functions and Their Applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 21-38
-
-
Hofheinz, D.1
Kiltz, E.2
-
19
-
-
61949132410
-
New Approach for Selectively Convertible Undeniable Signature Schemes
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Kurosawa, K., Takagi, T.: New Approach for Selectively Convertible Undeniable Signature Schemes. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 428-443. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 428-443
-
-
Kurosawa, K.1
Takagi, T.2
-
20
-
-
84947730183
-
Generating RSA Moduli with a Predetermined Portion
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Lenstra, A.K.: Generating RSA Moduli with a Predetermined Portion. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 1-10. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 1-10
-
-
Lenstra, A.K.1
-
21
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
33646031793
-
The security of the FDH variant of Chaum's undeniable signature scheme
-
Ogata, W., Kurosawa, K., Heng, S.: The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory 52(5), 2006-2017 (2006)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.5
, pp. 2006-2017
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.3
|