-
3
-
-
84921018856
-
-
In Proceedings of Advancesin Cryptology, Crypto'00, LNCS1880
-
Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of Advancesin Cryptology, Crypto'00, LNCS1880, 2000; 255-270.
-
(2000)
A Practical and Provably Secure Coalition-resistant Group Signature Scheme
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
7
-
-
0001604533
-
-
In Proceedings of Advances in Cryptology, Crypto'82
-
Chaum D. Blind signatures for untraceable payments. In Proceedings of Advances in Cryptology, Crypto'82, 1982; 199-203.
-
(1982)
Blind Signatures For Untraceable Payments
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
35248839965
-
-
In Proceedings of International Conference on Security in Communication Networks, LNCS 2576
-
Camenisch J, Lysyanskaya A. A signature scheme with efficient protocols. In Proceedings of International Conference on Security in Communication Networks, LNCS 2576, 2002; 268-289.
-
(2002)
A Signature Scheme With Efficient Protocols
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
33646010926
-
-
In Proceedings of 8th Information Security Conference, ISC'05
-
Yang YJ, Ooi BC. A privacy preserving rental system. In Proceedings of 8th Information Security Conference, ISC'05, 2005; 59-73.
-
(2005)
A Privacy Preserving Rental System
, pp. 59-73
-
-
Yang, Y.J.1
Ooi, B.C.2
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 1985; 28(10): 1030-1044.
-
(1985)
Communications of The Acm
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
67651053584
-
-
In Proceedings of Selected Areas in Cryptography, LNCS
-
Lysyanskaya A, Rivest R, Sahai A, Wolf S. Pseudonym systems. In Proceedings of Selected Areas in Cryptography, LNCS 1758, 1999.
-
(1758)
Pseudonym Systems
, pp. 1999
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
19
-
-
24944435537
-
-
In Proceedings of Advances in Cryptology, Enrocrypt'05, LNCS 3494
-
Camenisch J, Hohenberger S, Lysyanskaya A. Compact E-Cash. In Proceedings of Advances in Cryptology, Enrocrypt'05, LNCS 3494, 2005; 302-321.
-
(2005)
Compact E-cash
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
20
-
-
74849105207
-
-
In Proceedings of Security and Cryptography for Networks, SCN'06, 2006. ASIACRYPT'05, LNCS 3329
-
Camenisch J, Hohenberger S, Lysyanskaya A. Balancing accountability and privacy using E-cash. In Proceedings of Security and Cryptography for Networks, SCN'06, 2006. ASIACRYPT'05, LNCS 3329, 2004; 308-322.
-
(2004)
Balancing Accountability and Privacy Using E-cash
, pp. 308-322
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
22
-
-
33646000942
-
-
In Proceedings of Information Security Conference, ISC'02, LNCS 2433
-
Shigetomi R, Otsuka A, Ogawa T, Imai H. An anonymous loan system based on group signature scheme. In Proceedings of Information Security Conference, ISC'02, LNCS 2433, 2002; 244-256.
-
(2002)
An Anonymous Loan System Based On Group Signature Scheme
, pp. 244-256
-
-
Shigetomi, R.1
Otsuka, A.2
Ogawa, T.3
Imai, H.4
-
26
-
-
84956869906
-
-
In Proceedings of Advances in Cryptology, Crypto'86, LNCS 263
-
Chaum D, Evertse JH, Graaf J, Peralta R. Demonstrating possession of a discrete logarithm without revealing it. In Proceedings of Advances in Cryptology, Crypto'86, LNCS 263, 1986; 200-212.
-
(1986)
Demonstrating Possession of A Discrete Logarithm Without Revealing It
, pp. 200-212
-
-
Chaum, D.1
Evertse, J.H.2
Graaf, J.3
Peralta, R.4
-
27
-
-
85043778396
-
-
In Proceedings Advances in Cryptology, Eurocrypt'90, LNCS 473
-
Chaum D. Zero-knowledge undeniable signatures. In Proceedings Advances in Cryptology, Eurocrypt'90, LNCS 473, 1990; 458-464.
-
(1990)
Zero-knowledge Undeniable Signatures
, pp. 458-464
-
-
Chaum, D.1
|