-
1
-
-
84921018856
-
A practical and provably secure coalitionresistant group signature scheme
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalitionresistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
84957043547
-
Quasi-efficient revocation in group signatures
-
Blaze, M. (ed.) FC 2002. Springer, Heidelberg
-
Ateniese, G., Song, D.X., Tsudik, G.: Quasi-efficient revocation in group signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 183-197. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2357
, pp. 183-197
-
-
Ateniese, G.1
Song, D.X.2
Tsudik, G.3
-
3
-
-
38149036554
-
Practical compact e-cash
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Practical compact e-cash. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 431-445. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4586
, pp. 431-445
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
4
-
-
78649848785
-
-
Full version available at
-
Au, M.H., Susilo, W., Yiu, S.-M.: Proof-of-knowledge of representation of committed value and its applications (2010), Full version available at, http://uow.academia.edu/ManHoAu
-
(2010)
Proof-of-knowledge of Representation of Committed Value and Its Applications
-
-
Au, M.H.1
Susilo, W.2
Yiu, S.-M.3
-
5
-
-
84976585166
-
Compact e-cash from bounded accumulator
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Au, M.H., Wu, Q., Susilo, W., Mu, Y.: Compact e-cash from bounded accumulator. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 178-195. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 178-195
-
-
Au, M.H.1
Wu, Q.2
Susilo, W.3
Mu, Y.4
-
6
-
-
2942747407
-
A note on negligible functions
-
Bellare, M.: A note on negligible functions. J. Cryptology 15(4), 271-284 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.4
, pp. 271-284
-
-
Bellare, M.1
-
7
-
-
84983104598
-
On defining proofs of knowledge
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
8
-
-
84949210733
-
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
-
Syverson, P.F. (ed.) FC 2001. Springer, Heidelberg
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 309-328. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2339
, pp. 309-328
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
9
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACMCCS 1993, pp. 62-73 (1993)
-
(1993)
ACMCCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gapdiffie- Hellman-group signature scheme
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gapdiffie- hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31-46. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
11
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
12
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
13
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
16
-
-
24944435537
-
Compact e-cash
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
17
-
-
35248839965
-
A Signature Scheme with Efficient Protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
19
-
-
84958612917
-
Efficient group signature schemes for large groups
-
extended abstract. Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
20
-
-
38049152998
-
Divisible e-cash systems can be truly anonymous
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 482-497. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 482-497
-
-
Canard, S.1
Gouget, A.2
-
22
-
-
72449167369
-
Group encryption: Non-interactive realization in the standard model
-
matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Cathalo, J., Libert, B., Yung, M.: Group encryption: Non-interactive realization in the standard model. In: matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 179-196. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 179-196
-
-
Cathalo, J.1
Libert, B.2
Yung, M.3
-
24
-
-
85024290278
-
Group signatures
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
25
-
-
33845243601
-
Short traceable signatures based on bilinear pairings
-
Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. Springer, Heidelberg
-
Choi, S.G., Park, K., Yung, M.: Short traceable signatures based on bilinear pairings. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 88-103. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4266
, pp. 88-103
-
-
Choi, S.G.1
Park, K.2
Yung, M.3
-
26
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
Imai, H., Zheng, Y. (eds.) PKC 2000. Springer, Heidelberg
-
Cramer, R., Damgård, I., MacKenzie, P.D.: Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354-373. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1751
, pp. 354-373
-
-
Cramer, R.1
Damgård, I.2
MacKenzie, P.D.3
-
27
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
28
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Damgård, I.: Efficient concurrent zero-knowledge in the auxiliary string model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 418-430. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 418-430
-
-
Damgård, I.1
-
29
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
30
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
31
-
-
33749544519
-
Round-optimal composable blind signatures in the common reference string model
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Fischlin, M.: Round-optimal composable blind signatures in the common reference string model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 60-77
-
-
Fischlin, M.1
-
32
-
-
77957002759
-
Automorphic signatures in bilinear groups and an application to round-optimal blind signatures
-
ePrint Archive, Report 2009/320
-
Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive, Report 2009/320 (2009)
-
(2009)
Cryptology
-
-
Fuchsbauer, G.1
-
34
-
-
0021941417
-
The Knowledge Complexity of Interactive Proof- Systems
-
Extended Abstract
-
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof- Systems (Extended Abstract). In: STOC 1985, pp. 291-304 (1985)
-
(1985)
STOC 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
35
-
-
38049020416
-
Concurrently-secure blind signatures without random oracles or setup assumptions
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hazay, C., Katz, J., Koo, C.-Y., Lindell, Y.: Concurrently-secure blind signatures without random oracles or setup assumptions. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 323-341. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 323-341
-
-
Hazay, C.1
Katz, J.2
Koo, C.-Y.3
Lindell, Y.4
-
36
-
-
84958591696
-
Security of blind digital signatures
-
extended abstract. Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
37
-
-
35048841283
-
Traceable signatures
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571-589. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
38
-
-
78649888490
-
Traceable signatures
-
ePrint Archive, Report 2004/007
-
Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. Cryptology ePrint Archive, Report 2004/007 (2004), http://eprint.iacr.org/
-
(2004)
Cryptology
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
39
-
-
24944524118
-
Group signatures with efficient concurrent join
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Kiayias, A., Yung, M.: Group signatures with efficient concurrent join. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 198-214. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
40
-
-
0038446804
-
Bounded-concurrent secure two-party computation without setup assumptions
-
Lindell, Y.: Bounded-concurrent secure two-party computation without setup assumptions. In: STOC 2003, pp. 683-692 (2003)
-
(2003)
STOC 2003
, pp. 683-692
-
-
Lindell, Y.1
-
41
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
42
-
-
78649875922
-
Efficient blind and partially blind signatures without random oracles
-
ePrint Archive, Report 2006/102
-
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. Cryptology ePrint Archive, Report 2006/102 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology
-
-
Okamoto, T.1
-
43
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
44
-
-
84927727752
-
Security proofs for signature schemes
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387-398. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
45
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology 13(3), 361-396 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
46
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
Schnorr, C.-P.: Efficient Signature Generation by Smart Cards. J. Cryptology 4(3), 161-174 (1991)
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
|