-
1
-
-
33749993205
-
Constant-size dynamic k-TAA
-
De Prisco, R., Yung, M. (eds.), Springer, Heidelberg, SCN 2006
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.4116, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
4
-
-
77955316428
-
-
Halevi Rabin (eds.)
-
Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi, Rabin (eds.) [19], pp. 60-79
-
Ring Signatures: Stronger Definitions and Constructions Without Random Oracles
, vol.19
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
5
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Kilian, J. (ed.), Springer, Heidelberg, TCC 2005
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
6
-
-
35248901398
-
A secure signature scheme from bilinear maps
-
Joye, M. (ed.), Springer, Heidelberg, CT-RSA 2003
-
Boneh, D., Mironov, I., Shoup, V.: A secure signature scheme from bilinear maps. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.2612, pp. 98-110. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2612
, pp. 98-110
-
-
Boneh, D.1
Mironov, I.2
Shoup, V.3
-
7
-
-
38049115330
-
Mesh signatures
-
Naor, M. (ed.), Springer, Heidelberg, EUROCRYPT 2007
-
Boyen, X.: Mesh signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 210-227. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 210-227
-
-
Boyen, X.1
-
8
-
-
14844295011
-
Direct anonymous attestation
-
Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.), ACM, New York
-
Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 132-145. ACM, New York (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
9
-
-
0038687775
-
Design and implementation of the demix anonymous credential system
-
Atluri, V. (ed.), ACM, New York
-
Camenisch, J., Van Herreweghen, E.: Design and implementation of the demix anonymous credential system. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 21-30. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
10
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.), Springer, Heidelberg, SCN 2002
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M.K. (ed.), Springer, Heidelberg, CRYPTO 2004
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
0031619016
-
The random oracle methodology
-
revisited (preliminary version)
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology. In: STOC, pp. 209-218 (1998), revisited (preliminary version)
-
(1998)
STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
38149083391
-
Ring signatures of sub-linear size without random oracles
-
Arge, L., Cachin, C., Jurdzínski, T., Tarlecki, A. (eds.), Springer, Heidelberg, ICALP 2007
-
Chandran, N., Groth, J., Sahai, A.: Ring signatures of sub-linear size without random oracles. In: Arge, L., Cachin, C., Jurdzínski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol.4596, pp. 423-434. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
, pp. 423-434
-
-
Chandran, N.1
Groth, J.2
Sahai, A.3
-
14
-
-
85024290278
-
Group signatures
-
Davies, D.W. (ed.), Springer, Heidelberg, EUROCRYPT 1991
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
15
-
-
33845246483
-
Ring signatures without random oracles
-
Lin, F.-C., Lee, D.-T., Lin, B.-S., Shieh, S., Jajodia, S. (eds.), ACM, New York
-
Chow, S.S.M., Wei, V.K.-W., Liu, J.K., Yuen, T.H.: Ring signatures without random oracles. In: Lin, F.-C., Lee, D.-T., Lin, B.-S., Shieh, S., Jajodia, S. (eds.) ASIACCS, pp. 297-302. ACM, New York (2006)
-
(2006)
ASIACCS
, pp. 297-302
-
-
Chow, S.S.M.1
Wei, V.K.-W.2
Liu, J.K.3
Yuen, T.H.4
-
16
-
-
77955310487
-
-
Wagner (ed.)
-
Coron, J.-S., Patarin, J., Seurin, Y.: The random oracle model and the ideal cipher model are equivalent. In: Wagner (ed.) [30], pp. 1-20
-
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
, vol.30
, pp. 1-20
-
-
Coron, J.-S.1
Patarin, J.2
Seurin, Y.3
-
17
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg, EUROCRYPT 2004
-
Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 609-626. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
18
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
19
-
-
77955310811
-
-
Halevi, S., Rabin, T. (eds.), Springer, Heidelberg, TCC 2006
-
Halevi, S., Rabin, T. (eds.): TCC 2006. LNCS, vol.3876. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
-
-
-
21
-
-
38049006385
-
Generic transformation to strongly unforgeable signatures
-
Katz, J., Yung, M. (eds.), Springer, Heidelberg, ACNS 2007
-
Huang, Q., Wong, D.S., Zhao, Y.: Generic transformation to strongly unforgeable signatures. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.4521, pp. 1-17. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 1-17
-
-
Huang, Q.1
Wong, D.S.2
Zhao, Y.3
-
22
-
-
84927752554
-
Designated verifier proofs and their applications
-
Maurer, U.M. (ed.), Springer, Heidelberg, EUROCRYPT 1996
-
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.1070, pp. 143-154. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
23
-
-
77955331903
-
-
Vaudenay (ed.)
-
Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay (ed.) [29], pp. 465-485
-
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
, vol.29
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
25
-
-
33744781066
-
An efficient and usable multi-show non-transferable anonymous credential system
-
Juels, A. (ed.), Springer, Heidelberg, FC 2004
-
Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, vol.3110, pp. 196-211. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 196-211
-
-
Persiano, G.1
Visconti, I.2
-
26
-
-
84946833891
-
How to leak a secret
-
Boyd, C. (ed.), Springer, Heidelberg, ASIACRYPT 2001
-
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
27
-
-
36049024799
-
Efficient ring signatures without random oracles
-
Okamoto, T., Wang, X. (eds.), Springer, Heidelberg, PKC 2007
-
Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.4450, pp. 166-180. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 166-180
-
-
Shacham, H.1
Waters, B.2
-
29
-
-
77955334779
-
-
Vaudenay, S. (ed.), Springer, Heidelberg, EUROCRYPT 2006
-
Vaudenay, S. (ed.): EUROCRYPT 2006. LNCS, vol.4004. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
-
-
-
30
-
-
77955315608
-
-
Wagner, D. (ed.), Springer, Heidelberg, CRYPTO 2008
-
Wagner, D. (ed.): CRYPTO 2008. LNCS, vol.5157. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
-
-
-
31
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.), Springer, Heidelberg, EUROCRYPT 2005
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|