-
1
-
-
84937579774
-
The Oracle diffie-hellman assumptions and an analysis of DHIES
-
Naccache, D. ed., Springer, Heidelberg
-
Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001)
-
(2001)
CT-RSA 2001. LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE CS, Los Alamitos
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D. K., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy 2003, pp. 180-196. IEEE CS, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy 2003
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
4
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Darnell, M. J. ed., Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
-
(1997)
Cryptography and Coding 1997. LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
84948991087
-
A secure and efficient conference key distribution system
-
De Santis, A. ed., Springer, Heidelberg
-
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
-
(1995)
EUROCRYPT 1994. LNCS
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
6
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Stern, J. ed., Springer, Heidelberg
-
Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
7
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B. ed., Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
35048855095
-
Secret handshakes from CA-oblivious encryption
-
Lee, P. J. ed., Springer, Heidelberg
-
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret Handshakes from CA-Oblivious Encryption. In: Lee, P. J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004)
-
(2004)
ASIACRYPT 2004. LNCS
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
9
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum Press, New York
-
Chaum, D.: Blind Signatures for Untraceable Payments. In: CRYPTO 1982, pp. 199-203. Plenum Press, New York (1983)
-
(1983)
CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
10
-
-
33746581872
-
Authentication for paranoids: Multi-party secret handshakes
-
Zhou, J., Yung, M., Bao, F. eds., Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Authentication for Paranoids: Multi-Party Secret Handshakes. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 325-339. Springer, Heidelberg (2006)
-
(2006)
ACNS 2006. LNCS
, vol.3989
, pp. 325-339
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
11
-
-
84867284322
-
Group secret handshakes or affiliation-hiding authenticated group key agreement
-
Abe, M. ed., Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 287-308. Springer, Heidelberg (2006)
-
(2006)
CT-RSA 2007. LNCS
, vol.4377
, pp. 287-308
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
12
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
Malkin, T. G. ed., Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. In: Malkin, T. G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008)
-
(2008)
CT-RSA 2008. LNCS
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
13
-
-
38049060325
-
Unlinkable secret handshakes and key-private group key management schemes
-
Katz, J., Yung, M. eds., Springer, Heidelberg
-
Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007. LNCS
, vol.4521
, pp. 270-287
-
-
Jarecki, S.1
Liu, X.2
-
14
-
-
70350325165
-
Private mutual authentication and conditional oblivious transfer
-
Halevi, S. ed., Springer, Heidelberg
-
Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 90-107
-
-
Jarecki, S.1
Liu, X.2
-
15
-
-
70350647637
-
Secret handshake: Strong anonymity definition and construction
-
Bao, F., Li, H., Wang, G. eds., Springer, Heidelberg
-
Kawai, Y., Yoneyama, K., Ohta, K.: Secret Handshake: Strong Anonymity Definition and Construction. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 219-229. Springer, Heidelberg (2009)
-
(2009)
ISPEC 2009. LNCS
, vol.5451
, pp. 219-229
-
-
Kawai, Y.1
Yoneyama, K.2
Ohta, K.3
-
16
-
-
79956319822
-
Affiliation-hiding key exchange with untrusted group authorities
-
Zhou, J. ed., Springer, Heidelberg
-
Manulis, M., Poettering, B., Tsudik, G.: Affiliation-Hiding Key Exchange with Untrusted Group Authorities. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol. 6123, pp. 402-419. Springer, Heidelberg (2010)
-
(2010)
ACNS 2010. LNCS
, vol.6123
, pp. 402-419
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
17
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13 (3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Brassard, G. ed., Springer, Heidelberg
-
Schnorr, C. P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1989)
-
(1989)
CRYPTO 1989. LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
19
-
-
49049098105
-
A flexible framework for secret handshakes
-
Danezis, G., Golle, P. eds., Springer, Heidelberg
-
Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
-
(2006)
PET 2006. LNCS
, vol.4258
, pp. 295-315
-
-
Tsudik, G.1
Xu, S.2
-
20
-
-
33746772091
-
RSA-based secret handshakes
-
Ytrehus, Ø. ed., Springer, Heidelberg
-
Vergnaud, D.: RSA-Based Secret Handshakes. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 252-274. Springer, Heidelberg (2006)
-
(2006)
WCC 2005. LNCS
, vol.3969
, pp. 252-274
-
-
Vergnaud, D.1
|