-
1
-
-
84955599449
-
How to date blind signatures
-
M. Abe and E. Fujisaki, "How to date blind signatures," ASIACRYPT 1996, pp.244-251, 1996.
-
(1996)
ASIACRYPT 1996
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
2
-
-
84974652864
-
Provably secure partially blind signatures
-
M. Abe and T. Okamoto, "Provably secure partially blind signatures," CRYPTO 2000, pp.271-286, 2000.
-
(2000)
CRYPTO 2000
, pp. 271-286
-
-
Abe, M.1
Okamoto, T.2
-
3
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," CRYPTO'00, pp.255-270, 2000.
-
(2000)
CRYPTO'00
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
0345490609
-
Efficient group signatures without trapdoors
-
G. Ateniese and B. de Medeiros, "Efficient group signatures without trapdoors," ASIACRYPT'03, pp.246-268, 2003.
-
(2003)
ASIACRYPT'03
, pp. 246-268
-
-
Ateniese, G.1
De Medeiros, B.2
-
5
-
-
84921023488
-
Some open issues and new directions in group signatures
-
G. Ateniese and G. Tsudik, "Some open issues and new directions in group signatures," FC'99, pp.196-211, 1999.
-
(1999)
FC'99
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
6
-
-
0005101868
-
Efficient proofs that a committed number lies in an interval
-
F. Boudot, "Efficient proofs that a committed number lies in an interval," EUROCRYPT'00, pp.255-270, 2000.
-
(2000)
EUROCRYPT'00
, pp. 255-270
-
-
Boudot, F.1
-
8
-
-
35048848152
-
Short signatures without random oracles
-
D. Boneh and X. Boyen, "Short signatures without random oracles," EUROCRYPT'04, pp.56-73, 2004.
-
(2004)
EUROCRYPT'04
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," FOCS'96, pp.514-523, 1996.
-
(1996)
FOCS'96
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
11
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," EUROCRYPT'03, pp.614-629, 2003.
-
(2003)
EUROCRYPT'03
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
12
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups," CT-RSA'05, pp.136-153, 2005.
-
(2005)
CT-RSA'05
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
13
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspects
-
J. Camenisch and J. Groth, "Group signatures: Better efficiency and new theoretical aspects," SCN'04, pp.120-133, 2004.
-
(2004)
SCN'04
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
14
-
-
24944435537
-
Compact e-cash
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya, "Compact e-cash," EUROCRYPT'05, pp.302-321, 2005.
-
(2005)
EUROCRYPT'05
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
16
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," CRYPTO 2002, pp.61-76, 2002.
-
(2002)
CRYPTO 2002
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
29244444524
-
List signature schemes
-
S. Canard, B. Schoenmakers, M. Stam, and J. Traoré, "List signature schemes," Discrete Appl. Math., vol.154, no.2, pp.189-201, 2006.
-
(2006)
Discrete Appl. Math.
, vol.154
, Issue.2
, pp. 189-201
-
-
Canard, S.1
Schoenmakers, B.2
Stam, M.3
Traoré, J.4
-
18
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
J. Camenisch and A. Lysyanskaya, "Signature schemes and anonymous credentials from bilinear maps," CRYPTO'04, pp.56-72, 2004.
-
(2004)
CRYPTO'04
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
5144226887
-
Easy come-easy go divisible cash
-
A. Chan, Y. Frankel, and Y. Tsiounis, "Easy come-easy go divisible cash," EUROCRYPT'98, pp.614-629, 1998.
-
(1998)
EUROCRYPT'98
, pp. 614-629
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
20
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol.24, no.2, pp.84-88, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
21
-
-
0003062028
-
Blind signature system
-
Plenum Press
-
D. Chaum, "Blind signature system," CRYPTO'83, pp.153-153, Plenum Press, 1984.
-
(1984)
CRYPTO'83
, pp. 153-153
-
-
Chaum, D.1
-
22
-
-
85024290278
-
Group signatures
-
Springer-Verlag
-
D. Chaum and E. van Heyst, "Group signatures," EUROCRYPT'91, pp.257-265, Springer-Verlag, 1991.
-
(1991)
EUROCRYPT'91
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
23
-
-
84990195007
-
Transferred cash grows in size
-
D. Chaum and T.P. Pedersen, "Transferred cash grows in size," EUROCRYPT' 92, pp.390-407, 1992.
-
(1992)
EUROCRYPT' 92
, pp. 390-407
-
-
Chaum, D.1
Pedersen, T.P.2
-
24
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols," CRYPTO'94, pp.174-187, Springer-Verlag, 1994.
-
(1994)
CRYPTO'94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
25
-
-
84867553981
-
A generalization, a simplification and some applications of paillier's probabilistic public-key system
-
I. Damgård and M. Jurik, "A generalization, a simplification and some applications of paillier's probabilistic public-key system," PKC'01, pp.119-136, 2001.
-
(2001)
PKC'01
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
26
-
-
33745828152
-
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
-
I. Damgård and J.B. Nielsen, "Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security," CRYPTO'02, pp.449-464, 2002.
-
(2002)
CRYPTO'02
, pp. 449-464
-
-
Damgård, I.1
Nielsen, J.B.2
-
27
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Springer-Verlag
-
Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup, "Anonymous identification in ad hoc groups," EUROCRYPT'04, pp.609-626, Springer-Verlag, 2004.
-
(2004)
EUROCRYPT'04
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
28
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Y. Dodis and A. Yampolskiy, "A verifiable random function with short proofs and keys," PKC'05, pp.416-431, 2005.
-
(2005)
PKC'05
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
29
-
-
84990731886
-
How to prove yourself: Practical solution to identification and signature problems
-
Springer-Verlag
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solution to identification and signature problems," CRYPTO'86, pp.186-194, Springer-Verlag, 1987.
-
(1987)
CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
30
-
-
26444446884
-
An efficient group signature scheme from bilinear maps
-
J. Furukawa and H. Imai, "An efficient group signature scheme from bilinear maps," ACISP'05, pp.455-467, 2005.
-
(2005)
ACISP'05
, pp. 455-467
-
-
Furukawa, J.1
Imai, H.2
-
31
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
J. Furukawa and K. Sako, "An efficient scheme for proving a shuffle," CRYPTO'01, pp.368-387, 2001.
-
(2001)
CRYPTO'01
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
32
-
-
77951270946
-
Traceable ring signature
-
eprint, PKC 2007, 83-93, Jan. 2008
-
E. Fujisaki and K. Suzuki, "Traceable ring signature," eprint http://eprint.iacr.org/2006/389, PKC 2007, pp.181-200, 2007. IEICE Trans. Fundamentals, vol.91-A, no.1, pp.83-93, Jan. 2008.
-
(2007)
IEICE Trans. Fundamentals
, vol.91-A
, Issue.1
, pp. 181-200
-
-
Fujisaki, E.1
Suzuki, K.2
-
33
-
-
0022793132
-
How to construct random function
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random function," J.ACM, vol.33, no.4, pp.797-807, 1986.
-
(1986)
J.ACM
, vol.33
, Issue.4
, pp. 797-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
34
-
-
35048841283
-
Traceable signatures
-
Springer-Verlag
-
A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable signatures," EUROCRYPT' 04, pp.571-589, Springer-Verlag, 2004.
-
(2004)
EUROCRYPT' 04
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
36
-
-
24944524118
-
Group signatures with efficient concurrent join
-
Full version
-
A. Kiayias and M. Yung, "Group signatures with efficient concurrent join," EUROCRYPT'05, pp.198-214, 2005. Full version: http://eprint.iacr. org/2005/345.
-
(2005)
EUROCRYPT'05
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
37
-
-
84957649548
-
Identity escrow
-
Springer-Verlag
-
J. Kilian and E. Petrank, "Identity escrow," CRYPTO'98, pp.169-185, Springer-Verlag, 1998.
-
(1998)
CRYPTO'98
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
38
-
-
0036475666
-
A new traitor tracing
-
Feb.
-
S. Mitsunari, M. Kasahara, and R. Sakai, "A new traitor tracing," IEICE Trans. Fundamentals, vol.E85-A, no.2, pp.481-484, Feb. 2002.
-
(2002)
IEICE Trans. Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Kasahara, M.2
Sakai, R.3
-
39
-
-
84948140143
-
Unlinkable electronic coupon protocol with anonymity control
-
T. Nakanishi, N. Haruna, and Y. Sugiyama, "Unlinkable electronic coupon protocol with anonymity control," ISW'99, pp.37-46, 1999.
-
(1999)
ISW'99
, pp. 37-46
-
-
Nakanishi, T.1
Haruna, N.2
Sugiyama, Y.3
-
40
-
-
77952418507
-
Electronic coupon ticket protocol with unlinkable transcripts of payments
-
T. Nakanishi, N. Haruna, and Y. Sugiyama, "Electronic coupon ticket protocol with unlinkable transcripts of payments," SCIS'99, pp.359-363, 1999.
-
(1999)
SCIS'99
, pp. 359-363
-
-
Nakanishi, T.1
Haruna, N.2
Sugiyama, Y.3
-
41
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," FOCS'97, pp.458-467, 1997.
-
(1997)
FOCS'97
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
42
-
-
0035754862
-
A verifiable secret shuffle and its application to evoting
-
C.A. Neff, "A verifiable secret shuffle and its application to evoting," ACM-CCS 01, pp.116-125, 2001.
-
(2001)
ACM-CCS 01
, pp. 116-125
-
-
Neff, C.A.1
-
43
-
-
84887271407
-
Efficient dynamic k-times anonymous authentication
-
L. Nguyen, "Efficient dynamic k-times anonymous authentication, " VIETCRYPT 2006, pp.81-98, 2006.
-
(2006)
VIETCRYPT 2006
, pp. 81-98
-
-
Nguyen, L.1
-
44
-
-
33645594520
-
Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings
-
L. Nguyen and R. Safavi-Naini, "Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings," ASIACRYPT' 04, pp.316-337, 2004.
-
(2004)
ASIACRYPT' 04
, pp. 316-337
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
45
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
L. Nguyen and R. Safavi-Naini, "Dynamic k-times anonymous authentication," ACNS'05, pp.318-333, 2005.
-
(2005)
ACNS'05
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
46
-
-
0031698965
-
One-time zero-knowledge authentications and their applications to untraceable electronic cash
-
Jan
-
T. Okamoto and K. Ohta, "One-time zero-knowledge authentications and their applications to untraceable electronic cash," IEICE Trans. Fundamentals, vol.E81-A, no.1, pp.2-10, Jan. 1998.
-
(1998)
IEICE Trans. Fundamentals
, vol.E81-A
, Issue.1
, pp. 2-10
-
-
Okamoto, T.1
Ohta, K.2
-
47
-
-
35048823260
-
An improvement of a practical secret voting scheme
-
M. Ohkubo, F. Miura, M. Abe, A. Fujioka, and T. Okamoto, "An improvement of a practical secret voting scheme," ISW'99, pp.37-46, 1999.
-
(1999)
ISW'99
, pp. 37-46
-
-
Ohkubo, M.1
Miura, F.2
Abe, M.3
Fujioka, A.4
Okamoto, T.5
-
48
-
-
84958615260
-
Detachable electronic coins
-
C. Pavlovski, C. Boyd, and E. Foo, "Detachable electronic coins," Information and Communication Security, Second International Conference, ICICS'99, pp.54-70, 1999.
-
(1999)
Information and Communication Security, Second International Conference, ICICS'99
, pp. 54-70
-
-
Pavlovski, C.1
Boyd, C.2
Foo, E.3
-
49
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T.P. Pedersen, "A threshold cryptosystem without a trusted party," EUROCRYPT'91, pp.522-526, 1991.
-
(1991)
EUROCRYPT'91
, pp. 522-526
-
-
Pedersen, T.P.1
-
50
-
-
77952330146
-
Restricted anonymous participation
-
Jan.
-
K. Sako, "Restricted anonymous participation," SCIS'00, B12, Jan. 2000.
-
(2000)
SCIS'00
, vol.B12
-
-
Sako, K.1
-
51
-
-
84955615815
-
Secure voting using partially compatible homomorphisms
-
K. Sako and J. Kilian, "Secure voting using partially compatible homomorphisms," CRYPTO'94, pp.411-424, 1994.
-
(1994)
CRYPTO'94
, pp. 411-424
-
-
Sako, K.1
Kilian, J.2
-
52
-
-
85027193098
-
Tag signature
-
Preliminary version of [53]), Jan.
-
I. Teranishi and J. Furukawa, "Tag signature," (Preliminary version of [53]), SCIS'03, 6C-2, Jan. 2003.
-
(2003)
SCIS'03
, vol.6C-2
-
-
Teranishi, I.1
Furukawa, J.2
-
53
-
-
35048839792
-
K-times anonymous authentication (Extended Abstract)
-
I. Teranishi, J. Furukawa, and K. Sako, "k-times anonymous authentication (Extended Abstract)," ASIACRYPT'04, pp.308-322, 2004.
-
(2004)
ASIACRYPT'04
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
54
-
-
33745871113
-
K-times anonymous authentication with a constant proving cost
-
I. Teranishi and K. Sako, "k-times anonymous authentication with a constant proving cost," PKC'06, pp.525-542, 2006.
-
(2006)
PKC'06
, pp. 525-542
-
-
Teranishi, I.1
Sako, K.2
|