-
1
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Halevi, S. (ed.), Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
2
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Ashby, V. (ed., Fairfax, Virginia, USA, November 3-5. ACM Press, New York
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993: 1st Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, pp. 62-73. ACM Press, New York (1993)
-
(1993)
ACM CCS 1993: 1st Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital sinatures (extended abstract)
-
Helleseth, T. (ed.), Springer, Heidelberg
-
Benaloh, J.C., de Mare, M.: One-way accumulators: A decentralized alternative to digital sinatures (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
-
(1994)
EUROCRYPT 1993. LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
5
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Advances in Cryptology - Eurocrypt '97
-
Baríc, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480-494. Springer, Heidelberg (1997) (Pubitemid 127067821)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
6
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M. (ed.), Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275-292. Springer, Heidelberg (2005) (Pubitemid 41231217)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
8
-
-
67049119910
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
-
Jarecki, S., Tsudik, G. (eds., Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
9
-
-
38049029638
-
Universal accumulators with efficient nonmembership proofs
-
Katz, J., Yung, M. (eds., Springer, Heidelberg
-
Li, J., Li, N., Xue, R.: Universal accumulators with efficient nonmembership proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 253-269. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007. LNCS
, vol.4521
, pp. 253-269
-
-
Li, J.1
Li, N.2
Xue, R.3
-
10
-
-
67650132596
-
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems
-
Fischlin, M. (ed.), Springer, Heidelberg
-
Au, M.H., Tsang, P.P., Susilo, W., Mu, Y.: Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 295-308. Springer, Heidelberg (2009)
-
(2009)
CT-RSA 2009. LNCS
, vol.5473
, pp. 295-308
-
-
Au, M.H.1
Tsang, P.P.2
Susilo, W.3
Mu, Y.4
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.), Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
40249111589
-
P-signatures and noninteractive anonymous credentials
-
Canetti, R. (ed.) Springer, Heidelberg
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 356-374
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
13
-
-
14844295011
-
Direct anonymous attestation
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P. (eds.) ACM CCS 2004, Washington D.C., USA, October 25-29, pp. 132-145. ACM Press, New York (2004) (Pubitemid 40338196)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
14
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
Atluri, V. (ed., Washington D.C., USA, November 18-22. ACM Press, New York
-
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Atluri, V. (ed.) ACM CCS 2002, Washington D.C., USA, November 18-22, pp. 21-30. ACM Press, New York (2002)
-
(2002)
ACM CCS 2002
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
16
-
-
74049125197
-
Anonymous credentials on a standard java card
-
Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.), Chicago, Illinois, USA, November 9-13. ACM Press, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM CCS 2009, Chicago, Illinois, USA, November 9-13, pp. 600-610. ACM Press, New York (2009)
-
(2009)
ACM CCS 2009
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
17
-
-
70349290797
-
PEREA: Towards practical TTP-free revocation in anonymous authentication
-
Ning, P., Syverson, P.F., Jha, S. (eds.), Alexandria, Virginia, USA, October 27-31. ACM Press, New York
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: PEREA: towards practical TTP-free revocation in anonymous authentication. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM CCS 2008, Alexandria, Virginia, USA, October 27-31, pp. 333-344. ACM Press, New York (2008)
-
(2008)
ACM CCS 2008
, pp. 333-344
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
18
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B. (ed.), Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
19
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Matsui, M. (ed.), Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
23
-
-
35048904095
-
Generic homomorphic undeniable signatures
-
Monnerat, J., Vaudenay, S.: Generic homomorphic undeniable signatures. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 354-371. Springer, Heidelberg (2004) (Pubitemid 39747765)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 354-371
-
-
Monnerat, J.1
Vaudenay, S.2
-
24
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Public Key Cryptography - PKC 2003
-
Groth, J.: A verifiable secret shuffle of homomorphic encryptions. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 145-160. Springer, Heidelberg (2002) (Pubitemid 36137134)
-
(2002)
Lecture Notes in Computer Science
, Issue.2567
, pp. 145-160
-
-
Groth, J.1
-
25
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
Financial Cryptography
-
Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001) (Pubitemid 33359599)
-
(2001)
Lecture Notes in Computer Science
, Issue.1962
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
26
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Mitzenmacher, M. (ed.), Bethesda, Maryland, USA, May 17-20. ACM Press, New York
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC Annual ACM Symposium on Theory of Computing, Bethesda, Maryland, USA, May 17-20, pp. 169-178. ACM Press, New York (2009)
-
(2009)
41st ACM STOC Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
27
-
-
77957005693
-
-
Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks (2010)
-
(2010)
Cryptography Against Continuous Memory Attacks
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
28
-
-
79955538557
-
Groth sahai proofs revisited
-
Nguyen, P.Q., Pointcheval, D. (eds. Springer, Heidelberg
-
Ghadafi, E., Smart, N.P., Warinschi, B.: Groth sahai proofs revisited. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 177-192. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 177-192
-
-
Ghadafi, E.1
Smart, N.P.2
Warinschi, B.3
-
29
-
-
79952503153
-
Revocation for delegatable anonymous credentials
-
Microsoft Research, One Microsoft Way, Redmond, WA 98052 (December
-
Acar, T., Nguyen, L.: Revocation for delegatable anonymous credentials. Technical Report MSR-TR-2010-170, Microsoft Research, One Microsoft Way, Redmond, WA 98052 (December 2010)
-
(2010)
Technical Report MSR-TR-2010-170
-
-
Acar, T.1
Nguyen, L.2
-
30
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
Okamoto, T., Wang, X. (eds., Springer, Heidelberg
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
(2007)
PKC 2007. LNCS
, vol.4450
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
31
-
-
52149104493
-
The uber-assumption family (invited talk)
-
Galbraith, S.D., Paterson, K.G. (eds., Springer, Heidelberg
-
Boyen, X.: The uber-assumption family (invited talk). In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
Pairing 2008. LNCS
, vol.5209
, pp. 39-56
-
-
Boyen, X.1
-
32
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.), Springer, Heidelberg
-
Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007. LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
|