-
1
-
-
72449151071
-
A framework for universally composable non-committing blind signatures
-
Abe, M., Ohkubo, M.: A framework for universally composable non-committing blind signatures. IACR ePrint Archive 2009 (2009)
-
(2009)
IACR ePrint Archive
-
-
Abe, M.1
Ohkubo, M.2
-
2
-
-
72449170809
-
Universally composable blind signatures in the plain model
-
Buan, A.B., Kråkmo, K.G.L.: Universally composable blind signatures in the plain model. IACR ePrint Archive 2006/405 (2006)
-
(2006)
IACR ePrint Archive 2006
, vol.405
-
-
Buan, A.B.1
Kråkmo, K.G.L.2
-
3
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145 (2001)
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
4
-
-
35048827809
-
On universally composable notions of security for signature, certification and authentication
-
Canetti, R.: On universally composable notions of security for signature, certification and authentication. IACR ePrint Archive 2003/239 (2003)
-
(2003)
IACR ePrint Archive 2003
, vol.239
-
-
Canetti, R.1
-
5
-
-
4944266340
-
-
Canetti, R.: Universally composable signatures, certification and authentication. In: 17th Computer Security FoundationsWorkshop, CSFW (2004); Revised version available in IACR ePrint archive 2003/239
-
Canetti, R.: Universally composable signatures, certification and authentication. In: 17th Computer Security FoundationsWorkshop, CSFW (2004); Revised version available in IACR ePrint archive 2003/239
-
-
-
-
6
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols. IACR ePrint Archive 2000/067
-
Dec
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. IACR ePrint Archive 2000/067. 2nd version updated on 13 Dec (2005)
-
(2005)
2nd version updated on 13
-
-
Canetti, R.1
-
7
-
-
84880897758
-
Universally composable commitments
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
8
-
-
35248819315
-
Universal composition with joint state
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
9
-
-
85181651886
-
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-204. Prenum Publishing Corporation (1982)
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-204. Prenum Publishing Corporation (1982)
-
-
-
-
10
-
-
85034632918
-
Elections with unconditionally-secret ballots and disruptions equivalent to breaking RSA
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Chaum, D.L.: Elections with unconditionally-secret ballots and disruptions equivalent to breaking RSA. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 177-182. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 177-182
-
-
Chaum, D.L.1
-
11
-
-
33749544519
-
Round-optimal composable blind signatures in the common reference model
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Fischlin, M.: Round-optimal composable blind signatures in the common reference model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 60-77
-
-
Fischlin, M.1
-
12
-
-
67049158194
-
-
Fischlin, M., Schröder, D.: Security of blind signatures under aborts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, 5443, pp. 297-316. Springer, Heidelberg (2009)
-
Fischlin, M., Schröder, D.: Security of blind signatures under aborts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 297-316. Springer, Heidelberg (2009)
-
-
-
-
13
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
Zheng, Y, Seberry, J, eds, AUSCRYPT 1992, Springer, Heidelberg
-
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244-251. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
15
-
-
77649262306
-
Simulation-sound NIZK proofs for a practical language and constant size group signatures
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
16
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
17
-
-
38049020416
-
-
Hazay, C., Katz, J., Koo, C., Lindell, Y.: Concurrently-secure blind signatures without random oracles or setup assumptions. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 323-341. Springer, Heidelberg (2007)
-
Hazay, C., Katz, J., Koo, C., Lindell, Y.: Concurrently-secure blind signatures without random oracles or setup assumptions. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 323-341. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
84958591696
-
Security of blind digital signatures
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
19
-
-
40249098611
-
-
Kiayias, A., Zhou, H.: Equivocal blind signatures and adaptive UC-security. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 340-355. Springer, Heidelberg (2008)
-
Kiayias, A., Zhou, H.: Equivocal blind signatures and adaptive UC-security. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 340-355. Springer, Heidelberg (2008)
-
-
-
-
20
-
-
0038446804
-
-
Lindell, Y.: Bounded-concurrent secure two-party computation without setup assumptions. In: STOC, pp. 683-692. ACM, New York (2003)
-
Lindell, Y.: Bounded-concurrent secure two-party computation without setup assumptions. In: STOC, pp. 683-692. ACM, New York (2003)
-
-
-
-
21
-
-
43249123514
-
Lower bounds and impossibility results for concurrent self composition
-
Lindell, Y.: Lower bounds and impossibility results for concurrent self composition. Journal of Cryptology 21(2), 200-249 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 200-249
-
-
Lindell, Y.1
-
22
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 339-360 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 339-360
-
-
Pointcheval, D.1
Stern, J.2
|