-
2
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
D. Beaver, and S. Haber, "Cryptographic protocols provably secure against dynamic adversaries," Eurocypt '92, pp. 307-323, 1993.
-
(1993)
Eurocypt '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
4
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
Springer-Verlag
-
A. Bender, J. Katz, and R. Morselli, "Ring signatures: Stronger definitions, and constructions without random oracles," Theory of Cryptography Conference, pp. 60-79, Springer-Verlag, 2006.
-
(2006)
Theory of Cryptography Conference
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
6
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Springer-Verlag, LNCS 1294
-
J. Camenisch, and M. Stadler, "Efficient group signature schemes for large groups," Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294, pp. 410-424, Springer-Verlag, 1997.
-
(1997)
Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
8
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspects
-
Springer-Verlag, LNCS 3352
-
J. Camenisch, and J. Groth, "Group signatures: Better efficiency and new theoretical aspects," SCN, LNCS 3352, pp. 120-133, Springer-Verlag, 2004.
-
(2004)
SCN
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
10
-
-
85024290278
-
Group signatures
-
Springer-Verlag, LNCS 547
-
D. Chaum, and E. Heyst, "Group signatures," Advances in Cryptology - Eurocrypt '91, LNCS 547, pp. 257-265, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Eurocrypt '91
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.2
-
12
-
-
84958626761
-
Deniable encryption
-
Springer-Verlag, London
-
C. Dwork, M. Naor, R. Canetti, and R. Ostrovsky," Deniable encryption," Proceedings of the 17th Annual international Cryptology Conference on Advances in Cryptology, pp. 90-104, Springer-Verlag, London, 1997.
-
(1997)
Proceedings of the 17th Annual international Cryptology Conference on Advances in Cryptology
, pp. 90-104
-
-
Dwork, C.1
Naor, M.2
Canetti, R.3
Ostrovsky, R.4
-
14
-
-
79957931151
-
Eliminating quadratic slowdown in two-prime rsa function sharing
-
July
-
M. H. Ibrahim, "Eliminating quadratic slowdown in two-prime rsa function sharing," International Journal of Network Security (IJNS), vol. 7, no. 1, pp. 107-114, July 2008.
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.1
, pp. 107-114
-
-
Ibrahim, M.H.1
-
18
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutualy trusted party
-
Springer-Verlag, I. B. Damgard, Editor, LNCS 473
-
I. Ingemarsson, and G. J. Simmons, "A protocol to set up shared secret schemes without the assistance of a mutualy trusted party," Advances in Cryptology - Eurocrypt '91, LNCS 473, pp. 266-282, I. B. Damgard, Editor, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - Eurocrypt '91
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.J.2
-
19
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Springer-Verlag, LNCS 2729
-
J. Katz, and M. Yung, "Scalable protocols for authenticated group key exchange," Advances in Cryptology - Crypto '03, LNCS 2729, pp. 110-125, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - Crypto '03
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
20
-
-
24944524118
-
Group Signatures With efficient Concurrent Join
-
Springer-Verlag, LNCS 3494
-
A. Kiayias, and M. Yung, "Group Signatures With efficient Concurrent Join," Advances in Cryptology - Eurocrypt '05, LNCS 3494, pp. 198-214, Springer- Verlag, 2005.
-
(2005)
Advances in Cryptology - Eurocrypt '05
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
21
-
-
0035835293
-
Robust threshold DSS signatures
-
H. Krawczyk, R. Gennaro, S. Jarecki, and T. Rabin, "Robust threshold DSS signatures," Information and Computation, vol. 164, no. 1, pp. 54-84, 2001.
-
(2001)
Information and Computation
, vol.164
, Issue.1
, pp. 54-84
-
-
Krawczyk, H.1
Gennaro, R.2
Jarecki, S.3
Rabin, T.4
-
22
-
-
33846862213
-
Secure distributed key generation for discrete-log based cryptosystems
-
H. Krawczyk, R. Gennaro, S. Jarecki, and T. Rabin, "Secure distributed key generation for discrete-log based cryptosystems," Journal of Cryptology, vol. 20, no. 1, pp. 51-83, 2007.
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Krawczyk, H.1
Gennaro, R.2
Jarecki, S.3
Rabin, T.4
-
23
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, A. Sahai, R. L. Rivest, and S. Wolf, "Pseudonym systems," Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, pp. 184-199, 2000.
-
(2000)
Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
, pp. 184-199
-
-
Lysyanskaya, A.1
Sahai, A.2
Rivest, R.L.3
Wolf, S.4
-
24
-
-
34247385140
-
Democratic group signatures - on an example of joint ventures
-
Taiwan, China
-
M. Manulis, "Democratic group signatures - on an example of joint ventures," Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 365-365, Taiwan, China, 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006)
, pp. 365-365
-
-
Manulis, M.1
-
25
-
-
0029723583
-
Adaptively secure multi-party computation
-
M. Naor, O. Goldreich, R. Canetti, and U. Feige, "Adaptively secure multi-party computation," 28th Annual ACM Symposium on Theory of Computing (STOC), pp. 639-648, 1996.
-
(1996)
28th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 639-648
-
-
Naor, M.1
Goldreich, O.2
Canetti, R.3
Feige, U.4
-
26
-
-
84982943258
-
Non-interactive and information theoretic secure verifiable secret sharing
-
J. Feigenbaum, Editor, Springer-Verlag, LNCS 576
-
T. Pedersen, "Non-interactive and information theoretic secure verifiable secret sharing," Advances in Cryptology - Crypto '91, LNCS 576, pp. 129-140, J. Feigenbaum, Editor, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - Crypto '91
, pp. 129-140
-
-
Pedersen, T.1
-
27
-
-
3142512728
-
Tree-based group key agreement
-
A. Perrig, G. Tsudik, and Y. Kim, "Tree-based group key agreement," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60-96, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Perrig, A.1
Tsudik, G.2
Kim, Y.3
-
28
-
-
4444225744
-
On the performance of group key agreement protocols
-
C. N. Rotaru, G. Tsudik, Y. Amir, and Y. Kim, "On the performance of group key agreement protocols," ACM Transactions on Information and System Security, vol. 7, no. 3, pp. 457-488, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Rotaru, C.N.1
Tsudik, G.2
Amir, Y.3
Kim, Y.4
-
29
-
-
84875399833
-
Linkable democratic group signatures
-
China
-
A. Sadeghi, J. Schwenk, and M. Manulis, "Linkable democratic group signatures," Proceedings of the 2nd Information Security Practice and Rexperience Conference (ISPEC 2006), pp. 11-14, China, 2006.
-
(2006)
Proceedings of the 2nd Information Security Practice and Rexperience Conference (ISPEC 2006)
, pp. 11-14
-
-
Sadeghi, A.1
Schwenk, J.2
Manulis, M.3
-
30
-
-
79957962035
-
Fast fully distributed and threshold rsa function sharing
-
Las Vegas, Nevada, USA
-
A. H. E. Sawy, I. A. Ali, I. I. Ibrahim, and M. H. Ibrahim, "Fast fully distributed and threshold rsa function sharing," Proceedings of Information Systems: New Generation Conference (ISNG 2004), pp. 11-15, Las Vegas, Nevada, USA, 2004.
-
(2004)
Proceedings of Information Systems: New Generation Conference (ISNG 2004)
, pp. 11-15
-
-
Sawy, A.H.E.1
Ali, I.A.2
Ibrahim, I.I.3
Ibrahim, M.H.4
-
31
-
-
33750795777
-
Fast three party shared generation of rsa keys without distributed primality test
-
Las Vegas, Nevada, USA
-
A. H. E. Sawy, I. I. Ibrahim, and M. H. Ibrahim, "Fast three party shared generation of rsa keys without distributed primality test," Proceedings of Information Systems: New Generation Conference (ISNG 2004), pp. 5-10, Las Vegas, Nevada, USA, 2004. [32] B. Schoenmakers, Efficient Proofs of OR, Manuscript, 3 pages, 1993.
-
(2004)
Proceedings of Information Systems: New Generation Conference (ISNG 2004)
, pp. 5-10
-
-
Sawy, A.H.E.1
Ibrahim, I.I.2
Ibrahim, M.H.3
-
33
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag, LNCS 2248
-
A. Shamir, R. L. Rivest, and Y. Tauman, "How to leak a secret," Asiacrypt 1, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248, pp. 552-565, Springer-Verlag, 2001.
-
(2001)
Asiacrypt 1, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 552-565
-
-
Shamir, A.1
Rivest, R.L.2
Tauman, Y.3
-
35
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. C. P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.C.P.1
-
36
-
-
33645459930
-
-
Technical Report CMU-CS-02-114-R, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, Sep
-
C. Wang, J. M. Wing, and T. M. Wong, Verifiable Secret Redistribution for Threshold Sharing Schemes, Technical Report CMU-CS-02-114-R, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, Sep. 2002.
-
(2002)
Verifiable Secret Redistribution for Threshold Sharing Schemes
-
-
Wang, C.1
Wing, J.M.2
Wong, T.M.3
-
37
-
-
35248843604
-
Foundations of group signatures: Formal definitions
-
Springer- Verlag, simplified requirements, and a construction based on general assumptions, LNCS 2656
-
B. Warinschi, D. Micciancio, and M. Bellare, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," Advances in Cryptology - Eurocrypt '03, LNCS 2656, pp. 614-629, Springer- Verlag, 2003.
-
(2003)
Advances in Cryptology - Eurocrypt '03
, pp. 614-629
-
-
Warinschi, B.1
Micciancio, D.2
Bellare, M.3
-
38
-
-
84898960610
-
Completeness theorems for noncryptographic faulttolerant distributed computations
-
A. Wigderson, M. B. Or, and S. Goldwasser, "Completeness theorems for noncryptographic faulttolerant distributed computations," Proceeding 20th Annual Symposium on the Theory of Computing, ACM, pp. 1-10, 1988.
-
(1988)
Proceeding 20th Annual Symposium on the Theory of Computing, ACM
, pp. 1-10
-
-
Wigderson, A.1
Or, M.B.2
Goldwasser, S.3
-
39
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad-hoc groups
-
LNCS 3108, Springer-Verlag
-
D. S. Wong, J. K. Liu, and V. K. Wei, "Linkable spontaneous anonymous group signature for ad-hoc groups, "Information Security and Privacy, 9th Australasian Conference, ACISP 2004, LNCS 3108, pp. 325-335, Springer-Verlag, 2004.
-
(2004)
Information Security and Privacy, 9th Australasian Conference, ACISP 2004
, pp. 325-335
-
-
Wong, D.S.1
Liu, J.K.2
Wei, V.K.3
-
40
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
LNCS 2656, Springer-Verlag
-
C. Zhang, H. Shi, and M. Bellare, "Foundations of group signatures: The case of dynamic groups," CT-RSA, LNCS 2656, pp. 136-153, Springer-Verlag, 2005.
-
(2005)
CT-RSA
, pp. 136-153
-
-
Zhang, C.1
Shi, H.2
Bellare, M.3
|