-
1
-
-
84921018856
-
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
-
CRYPTO '00, of, Springer
-
Ateniese, G., Camenisch, J., Joye, M., and Tsudik, G. (2000). A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO '00, volume 1880 of LNCS, pages 255-270. Springer.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
New York, NY, USA. ACM
-
Bellare, M. and Rogaway, P. (1993). Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In CCS '93, pages 62-73, New York, NY, USA. ACM.
-
(1993)
CCS '93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
CRYPTO '01, of, London, UK. Springer
-
Boneh, D. and Franklin, M. K. (2001). Identity-Based Encryption from the Weil Pairing. In CRYPTO '01, volume 2139 of LNCS, pages 213-229, London, UK. Springer.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
38149094079
-
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
-
Springer
-
Brands, S., Demuynck, L., and Decker, B. D. (2007). A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. In ACISP 2007, volume 4586 of LNCS, pages 400-415. Springer.
-
(2007)
ACISP 2007, volume 4586 of LNCS
, pp. 400-415
-
-
Brands, S.1
Demuynck, L.2
Decker, B.D.3
-
5
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
EUROCRYPT '01, of, London, UK. Springer
-
Camenisch, J. and Lysyanskaya, A. (2001). An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In EUROCRYPT '01, volume 2045 of LNCS, pages 93-118, London, UK. Springer.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
84884407609
-
Implementing Group Signature Schemes with Smart Cards
-
USENIX
-
Canard, S. and Girault, M. (2002). Implementing Group Signature Schemes with Smart Cards. In CARDIS '02, pages 1-10. USENIX.
-
(2002)
CARDIS '02
, pp. 1-10
-
-
Canard, S.1
Girault, M.2
-
7
-
-
85024290278
-
Group Signatures
-
EUROCRYPT '91, of, Springer
-
Chaum, D. and van Heyst, E. (1991). Group Signatures. In EUROCRYPT '91, volume 547 of LNCS, pages 257-265. Springer.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
8
-
-
0029541045
-
Private Information Retrieval
-
IEEE Computer Society
-
Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. (1995). Private Information Retrieval. In FOCS '95, pages 41-50. IEEE Computer Society.
-
(1995)
FOCS '95
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
9
-
-
74549125116
-
-
A Survey of Anonymous Communication Channels. Technical Report MSR-TR-2008-35, Microsoft Research
-
Danezis, G. and Diaz, C. (2008). A Survey of Anonymous Communication Channels. Technical Report MSR-TR-2008-35, Microsoft Research.
-
(2008)
-
-
Danezis, G.1
Diaz, C.2
-
10
-
-
74549170145
-
-
Dworkin, M. (2007). Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. In National Institute of Standards and Technology SP 800-38D.
-
Dworkin, M. (2007). Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. In National Institute of Standards and Technology SP 800-38D.
-
-
-
-
11
-
-
0347684347
-
The Death of Privacy?
-
Froomkin, M. (2000). The Death of Privacy? Stanford Law Review, 52(5): 1461-1543.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1461-1543
-
-
Froomkin, M.1
-
12
-
-
74549145252
-
Anonymous Authentication - Preserving Your Privacy Online
-
Lindell, Y. (2007). Anonymous Authentication - Preserving Your Privacy Online. Black Hat 2007.
-
(2007)
Black Hat 2007
-
-
Lindell, Y.1
-
13
-
-
79960836060
-
Deniable Ring Authentication
-
CRYPTO '02, of, Springer
-
Naor, M. (2002). Deniable Ring Authentication. In CRYPTO '02, volume 2442 of LNCS, pages 481-498. Springer.
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
14
-
-
3142585395
-
A Secure and Private System for Subscription-Based Remote Services
-
Persiano, P. and Visconti, I. (2003). A Secure and Private System for Subscription-Based Remote Services. ACM Trans. Inf. Syst. Secur., 6(4):472-500.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 472-500
-
-
Persiano, P.1
Visconti, I.2
-
15
-
-
84946833891
-
How to Leak a Secret
-
ASIACRYPT '01, of, Springer
-
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How to Leak a Secret. In ASIACRYPT '01, volume 2248 of LNCS, pages 552-565. Springer.
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
16
-
-
84956867779
-
Anonymous Authentication of Membership in Dynamic Groups
-
Proc. International Conference on Financial Cryptography 1999, of, Springer
-
Schechter, S., Parnell, T., and Hartemink, A. (1999). Anonymous Authentication of Membership in Dynamic Groups. In Proc. International Conference on Financial Cryptography 1999, volume 1648 of LNCS, pages 184-195. Springer.
-
(1999)
LNCS
, vol.1648
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
17
-
-
84880381452
-
Accountable Ring Signatures: A Smart Card Approach
-
Kluwer
-
Xu, S. and Yung, M. (2004). Accountable Ring Signatures: A Smart Card Approach. In CARDIS'04, pages 271-286. Kluwer.
-
(2004)
CARDIS'04
, pp. 271-286
-
-
Xu, S.1
Yung, M.2
|