-
1
-
-
84983104598
-
On Defining Proofs of Knowledge
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
2
-
-
35048841300
-
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
4
-
-
84958612917
-
Efficient Group Signature Schemes for Large Groups
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
5
-
-
0035163054
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: FOCS
-
Los Alamitos
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: FOCS 2001, pp. 136-145. IEEE, Los Alamitos (2001)
-
(2001)
136-145. IEEE
, pp. 2001
-
-
Canetti, R.1
-
6
-
-
0022145479
-
Security Without Identification: Transaction Systems to Make Big Brother Obsolete
-
Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10), 1030-1044 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
79251590715
-
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Chaum, D., Evertse, J.-H.: A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118-167. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
8
-
-
84957802212
-
-
Cramer, R., Damgård, L., MacKenzie, P.D.: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 354-373. Springer, Heidelberg (2000)
-
Cramer, R., Damgård, L., MacKenzie, P.D.: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354-373. Springer, Heidelberg (2000)
-
-
-
-
9
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
10
-
-
70349557354
-
Hierarchical ID-Based Cryptography
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
11
-
-
71149116146
-
Proofs that Yield Nothing But Their Validity for All Languages in NP Have Zero-Knowledge Proof Systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that Yield Nothing But Their Validity for All Languages in NP Have Zero-Knowledge Proof Systems. J. ACM 38(3), 691-729 (1991)
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput. 18(1), 186-208 (1989)
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
14
-
-
77953575420
-
Attribute Based Group Signature with Revocation. Cryptology ePrint Archive, Report 2007/241
-
Khader, D.: Attribute Based Group Signature with Revocation. Cryptology ePrint Archive, Report 2007/241 (2007), http://eprint.iacr.org/2007/241
-
-
-
Khader, D.1
-
15
-
-
77953561932
-
Attribute Based Group Signatures. Cryptology ePrint Archive, Report 2007/159
-
Khader, D.: Attribute Based Group Signatures. Cryptology ePrint Archive, Report 2007/159 (2007), http://eprint.iacr.org/2007/159
-
-
-
Khader, D.1
-
16
-
-
78649869004
-
Authenticating with Attributes. Cryptology ePrint Archive
-
Report 2008/031
-
Khader, D.: Authenticating with Attributes. Cryptology ePrint Archive, Report 2008/031 (2008), http://eprint.iacr.org/2008/031
-
(2008)
-
-
Khader, D.1
-
17
-
-
67650360607
-
Attribute-Based Ring Signatures. Cryptology ePrint Archive
-
Report 2008/394
-
Li, J., Kim, K.: Attribute-Based Ring Signatures. Cryptology ePrint Archive, Report 2008/394 (2008), http://eprint.iacr.org/2008/394
-
(2008)
-
-
Li, J.1
Kim, K.2
-
19
-
-
67651053584
-
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, CM. (eds.) SAC 1999. LNCS, 1758, pp. 184-199. Springer, Heidelberg (2000)
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, CM. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
-
-
-
20
-
-
76549132529
-
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. Cryptology ePrint Archive
-
Report 2008/328
-
Maji, H., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance. Cryptology ePrint Archive, Report 2008/328 (2008), http://eprint.iacr.org/2008/328
-
(2008)
-
-
Maji, H.1
Prabhakaran, M.2
Rosulek, M.3
-
21
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R, ed, EU-ROCRYPT 2005, Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
22
-
-
84871486180
-
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Cryptology ePrint Archive
-
Report 2009/126
-
Shahandashti, S.F., Safavi-Naini, R.: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Cryptology ePrint Archive, Report 2009/126 (2009), http://eprint.iacr.org/2009/126
-
(2009)
-
-
Shahandashti, S.F.1
Safavi-Naini, R.2
-
23
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
25
-
-
70350667481
-
-
25. Yang, P., Cao, Z., Dong, X.: Fuzzy Identity Based Signature. Cryptology ePrint Archive, Report 2008/002 (2008), http://eprint.iacr.org/2008/ 002
-
25. Yang, P., Cao, Z., Dong, X.: Fuzzy Identity Based Signature. Cryptology ePrint Archive, Report 2008/002 (2008), http://eprint.iacr.org/2008/ 002
-
-
-
|