-
1
-
-
77958038083
-
-
accessed April 2010
-
Windowscardspace(2010), http://www.microsoft.com/windows/products/ winfamily/cardspace/(accessed April 2010)
-
(2010)
Windowscardspace
-
-
-
2
-
-
33749993205
-
Constant-size dynamic k-TAA
-
De Prisco, R., Yung, M. (eds.) Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
3
-
-
33749661564
-
A cryptographic framework for the controlled release ofcertified data
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Springer, Heidelberg
-
Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release ofcertified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Se-curity Protocols 2004. LNCS, vol. 3957, pp. 20-42. Springer, Heidelberg (2006)
-
(2006)
Security Protocols 2004. LNCS
, vol.3957
, pp. 20-42
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
-
4
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Halevi, S. (ed.) Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
5
-
-
40249111589
-
P-signatures and noninteractive anonymous credentials
-
Canetti, R. (ed.) Springer, Heidelberg
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 356-374
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
6
-
-
74049125197
-
Anonymous credentials on a standard Java Card
-
appear
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: ACM Conference on Computer and Communications Security (2009) (to appear)
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
7
-
-
35048887476
-
Short group signatures
-
Franklin, M. K. (ed.) Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
14844309671
-
Group signatures with verifier-local revocation
-
Atluri, V., Pfitz-mann, B., McDaniel, P. (eds.) ACM, ACM, New York
-
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Atluri, V., Pfitz-mann, B., McDaniel, P. (eds.) ACM CCS 2004, pp. 168-177. ACM, New York (2004)
-
(2004)
CCS 2004
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
9
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
Fumy, W. (ed.) Springer, Heidelberg
-
Brands, S.: Rapid demonstration of linear relations connected by boolean operators. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 318-333. Springer, Heidelberg (1997)
-
(1997)
EUROCRYPT 1997. LNCS
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
12
-
-
38149094079
-
A practical system for globally revoking the un-linkable pseudonyms of unknown users
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Springer, Heidelberg
-
Brands, S., Demuynck, L., De Decker, B.:A practical system for globally revoking the un-linkable pseudonyms of unknown users. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 400-415. Springer, Heidelberg (2007)
-
(2007)
ACISP 2007. LNCS
, vol.4586
, pp. 400-415
-
-
Brands, S.1
Demuynck, L.2
De Decker, B.3
-
13
-
-
38149094079
-
A practical system for globally revoking the un-linkable pseudonyms of unknown users
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Springer, Heidelberg
-
Brands, S., Demuynck, L., De Decker, B.: A practical system for globally revoking the un-linkable pseudonyms of unknown users. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 400-415. Springer, Heidelberg (2007)
-
(2007)
ACISP 2007. LNCS
, vol.4586
, pp. 400-415
-
-
Brands, S.1
Demuynck, L.2
De Decker, B.3
-
14
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. 11th ACM Conference on Computer and Communications Security, pp. 225-234. ACM Press, New York (2004)
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security
, pp. 225-234
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
16
-
-
67049119910
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
-
Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
17
-
-
84945135810
-
Efficient non-transferable anonymous multi-show creden-tial system with optional anonymity revocation
-
Pfitzmann, B. (ed.) Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show creden-tial system with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
84937428748
-
Dynamic accumulators and application to efficient revo-cation of anonymous credentials
-
Yung, M. (ed.) Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revo-cation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) Springer, Heidel-berg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidel-berg (2003)
-
(2003)
SCN 2002. LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
20
-
-
35048845114
-
Signature schemes and anonymous credentials from bilin-ear maps
-
Franklin, M.K. (ed.) Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilin-ear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
21
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safeprimes
-
Stern, J. (ed.) Springer, Heidelberg
-
Camenisch, J., Michels, M.: Proving in zero-knowledge that a number n is the product of two safeprimes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
22
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Kaliski Jr., B.S. (ed.) Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
CRYPTO 1997. LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
24
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obso-lete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obso-lete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
25
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.) Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
26
-
-
51049122345
-
-
May
-
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard) (May 2008)
-
(2008)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard)
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
27
-
-
84957802212
-
Efficient zero-knowledge proofs of knowl-edge without intractability assumptions
-
Imai, H., Zheng, Y. (eds.) Springer, Heidelberg
-
Cramer, R., Damga°rd, I., MacKenzie, P.D.: Efficient zero-knowledge proofs of knowl-edge without intractability assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354-372. Springer, Heidelberg (2000)
-
(2000)
PKC 2000. LNCS
, vol.1751
, pp. 354-372
-
-
Cramer, R.1
Damgard, I.2
MacKenzie, P.D.3
-
28
-
-
85016672373
-
Proofs of partial knowledge and simplified de-sign of witness hiding protocols
-
Desmedt, Y.G. (ed.) Springer, Heidelberg
-
Cramer, R., Damga°rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified de-sign of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1994. LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
29
-
-
84885074292
-
Performance analysis of accumulator-based revocation mechanisms
-
Springer, Heidelberg
-
Lapon, J., Kohlweiss, M., De Decker, B., Naessens, V.: Performance analysis of accumulator-based revocation mechanisms. In: Proceedings of the 25th International Conference on Infor-mation Security (SEC 2010), Brisbane, AU. IFIP Conference Proceedings, p. 12. Springer, Heidelberg (2010)
-
(2010)
Proceedings of the 25th International Conference on Infor-mation Security (SEC 2010), Brisbane, AU. IFIP Conference Proceedings
, pp. 12
-
-
Lapon, J.1
Kohlweiss, M.2
De Decker, B.3
Naessens, V.4
-
30
-
-
67049119911
-
Revocable group signature schemes with constant costs for signing and verifying
-
Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg
-
Nakanishi, T., Fujii, H., Hira, Y., Funabiki, N.: Revocable group signature schemes with constant costs for signing and verifying. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 463-480. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 463-480
-
-
Nakanishi, T.1
Fujii, H.2
Hira, Y.3
Funabiki, N.4
-
31
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J. (ed.) Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991. LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
32
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
33
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving users without ttps
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable anonymous credentials: blocking misbehaving users without ttps. In: CCS 2007: Proceedings of the 14th ACM con-ference on Computer and communications security, pp. 72-81 (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Con-ference on Computer and Communications Security
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
|