-
1
-
-
33646781565
-
An Efficient Group Signature Scheme from Bilinear Maps
-
Jun Furukawa, Hideki Imai: An Efficient Group Signature Scheme from Bilinear Maps. IEICE Transactions 89-A(5): 1328-1338 (2006)
-
(2006)
IEICE Transactions
, vol.89-A
, Issue.5
, pp. 1328-1338
-
-
Jun Furukawa, H.I.1
-
3
-
-
38049042811
-
Tate: A Direct Anonymous Attestation Scheme for Embedded Devices
-
He Ge, Stephen R. Tate: A Direct Anonymous Attestation Scheme for Embedded Devices. Public Key Cryptography 2007: 16-30
-
(2007)
Public Key Cryptography
, pp. 16-30
-
-
Ge, H.1
Stephen, R.2
-
5
-
-
70350679379
-
-
National Security Agency, Accessed on April 11, 2006
-
National Security Agency. The Case for Elliptic Curve Cryptography, Accessed on April 11, 2006. http://www.nsa.gov/ia/industry/ crypto_eliptic_curve.cfm.
-
The Case for Elliptic Curve Cryptography
-
-
-
6
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO'91, of, Springer Verlag
-
Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pryds Pedersen, T.1
-
7
-
-
78651566114
-
-
TCG.http://www.trustedcomputinggroup.org
-
TCG.http://www.trustedcomputinggroup.org
-
-
-
-
8
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
CRYPTO'86, of
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO'86, vol. 263 of LNCS, pp. 186-194.
-
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
26444562547
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
-
(2002)
IEICE Trans
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Miyaji, A.1
Masaki Nakabayashi, S.T.2
-
10
-
-
35048847167
-
-
Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
-
Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
-
-
-
-
11
-
-
0342880858
-
-
PhD thesis, Weizmann Institute of Science, Rehovot, Israel, June
-
R. Canetti. Studies in Secure Multiparty Computation and Applications. PhD thesis, Weizmann Institute of Science, Rehovot 76100, Israel, June 1995.
-
(1995)
Studies in Secure Multiparty Computation and Applications
, pp. 76100
-
-
Canetti, R.1
-
14
-
-
58349104351
-
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive
-
Report 2007/194
-
Ernie Brickell,Jiangtao Li,Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive, Report 2007/194
-
-
-
Ernie Brickell, J.L.1
-
15
-
-
0000901529
-
-
D.Pointcheval and J.Stern,Security arguments for digital signatures and blind signatures,J.Crytol.,13,no.3,pp.361-396,2000.
-
D.Pointcheval and J.Stern,Security arguments for digital signatures and blind signatures,J.Crytol.,vol.13,no.3,pp.361-396,2000.
-
-
-
-
16
-
-
33845516445
-
-
Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
-
Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
-
-
-
-
17
-
-
33749405352
-
Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer
-
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer Computing 2005: 117-124
-
(2005)
Computing
, pp. 117-124
-
-
Balfe, S.1
Lakhani, A.D.2
-
19
-
-
35248839965
-
A signature scheme with efficient protocols
-
SCN of, Springer Verlag
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, pp. 268-289. Springer Verlag, 2003.
-
(2002)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
21
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B. Kaliski,editor, Advances in Cryptology, CRYPTO'97, of, SpringerVerlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski,editor, Advances in Cryptology - CRYPTO'97, volume 1296 of LNCS, pages 410-424. SpringerVerlag, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
22
-
-
78651546109
-
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
-
Villach,Austria,March
-
Ernie Brickell,Liqun Chen and Jiangtao Li. Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings,In Conference on Trusted Computing(TRUST 2008),Villach,Austria,March 2008.
-
(2008)
Conference on Trusted Computing(TRUST
-
-
Ernie Brickell, L.C.1
Li, J.2
|