-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann,B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, p. 119. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 119
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
0030646696
-
Optimistic protocols for fair exchange
-
ACM Press, New York
-
Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: ACM CCS 1997. ACM Press, New York (1997)
-
(1997)
ACM CCS 1997
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
3
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE JSAC 18(4), 593-610 (2000)
-
(2000)
IEEE JSAC
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
33749993205
-
Constant-size dynamic k-TAA
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.4116, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
5
-
-
84983104598
-
On defining proofs of knowledge
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
6
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Brands, S.: Rapid demonstration of linear relations connected by boolean operators. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.1233, pp. 318-333. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
9
-
-
58349085879
-
Efficient protocols for set membership and range proofs
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Camenisch, J., Chaabouni, R., Shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.5350, pp. 234-252. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 234-252
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
10
-
-
74049137084
-
Oblivious transfer with access control
-
ACM Press, New York
-
Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: ACM CCS 2009. ACM Press, New York (2009)
-
(2009)
ACM CCS 2009
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
12
-
-
67650686038
-
On the portability of generalized schnorr proofs
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Camenisch, J., Kiayias, A., Yung, M.: On the portability of generalized schnorr proofs. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.5479, pp. 425-442. Springer, Heidelberg (2010)
-
LNCS
, vol.5479
, Issue.2010
, pp. 425-442
-
-
Camenisch, J.1
Kiayias, A.2
Yung, M.3
-
13
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Camenisch, J., Michels, M.: Proving in zero-knowledge that a number n is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, p. 107. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 107
-
-
Camenisch, J.1
Michels, M.2
-
15
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
16
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
17
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
19
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
FOCS 2001
-
-
Canetti, R.1
-
20
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.:Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
21
-
-
67049100253
-
Controlling access to an oblivious database using stateful anonymous credentials
-
Jareck, S., Tsudik, G. (eds.)PKC 2009. Springer, Heidelberg
-
Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jareck, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 501-520. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 501-520
-
-
Coull, S.1
Green, M.2
Hohenberger, S.3
-
22
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.3386, pp. 416-431. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
23
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
24
-
-
77955086989
-
Protecting data privacy in private information retrieval schemes
-
ACM Press, New York
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: ACM STOC. ACM Press, New York (1998)
-
(1998)
ACM STOC.
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
25
-
-
0034447081
-
Composition and integrity preservation of secure reactive systems
-
ACM Press, New York
-
Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: ACM CCS 2000. ACM Press, New York (2000)
-
(2000)
ACM CCS 2000
-
-
Pfitzmann, B.1
Waidner, M.2
-
26
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
27
-
-
35248831111
-
Practical oblivious transfer protocols
-
Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
-
Tobias, C.: Practical oblivious transfer protocols. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.2578, pp. 415-426. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2578
, pp. 415-426
-
-
Tobias, C.1
-
28
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society Press, Los Alamitos
-
Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
IEEE Symposium on Research in Security and Privacy
-
-
Pfitzmann, B.1
Waidner, M.2
-
29
-
-
70049105527
-
Universallycomposableadaptivepricedoblivious transfer
-
Shacham,H. (ed.) Pairing2009. .Springer,Heidelberg
-
Rial,A.,Kohlweiss,M.,Preneel,B.: Universallycomposableadaptivepricedoblivious transfer. In:Shacham,H. (ed.) Pairing2009.LNCS, vol.5671, pp. 231-247.Springer,Heidelberg(2009)
-
(2009)
LNCS
, vol.5671
, pp. 231-247
-
-
Rial, A.1
Kohlweiss, M.2
Preneel, B.3
|