-
1
-
-
84945119655
-
A secure three-move blind signature scheme for polynomially many signatures
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Abe, M.: A secure three-move blind signature scheme for polynomially many signatures. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 136-151. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 136-151
-
-
Abe, M.1
-
2
-
-
77956996315
-
Structure-preserving signatures and commitments to group elements
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
3
-
-
72449208074
-
A framework for universally composable non-committing blind signatures
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Abe, M., Ohkubo, M.: A framework for universally composable non-committing blind signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 435-450. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 435-450
-
-
Abe, M.1
Ohkubo, M.2
-
5
-
-
70350341688
-
2)- query attack on any key exchange from a random oracle
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
2)- query attack on any key exchange from a random oracle. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 374-390. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 374-390
-
-
Barak, B.1
Mahmoody-Ghidary, M.2
-
6
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. Journal of Cryptology 16(3), 185-215 (2003)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
7
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31-46. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
8
-
-
23944509128
-
Efficient blind signatures without random oracles
-
Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
-
Camenisch, J.L., Koprowski, M., Warinschi, B.: Efficient blind signatures without random oracles. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 134-148. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 134-148
-
-
Camenisch, J.L.1
Koprowski, M.2
Warinschi, B.3
-
9
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Camenisch, J.L., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573-590. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 573-590
-
-
Camenisch, J.L.1
Neven, G.2
Shelat, A.3
-
10
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum Press, New York
-
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - Crypto 1982, pp. 199-203. Plenum Press, New York (1983)
-
(1983)
Advances in Cryptology - Crypto 1982
, pp. 199-203
-
-
Chaum, D.1
-
11
-
-
81055135743
-
Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations
-
Report 2010/648
-
Fiore, D., Schröder, D.: Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations. Cryptology ePrint Archive, Report 2010/648 (2010), http://eprint.iacr.org/2010/ 648
-
(2010)
Cryptology EPrint Archive
-
-
Fiore, D.1
Schröder, D.2
-
12
-
-
33749544519
-
Round-optimal composable blind signatures in the common reference string model
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Fischlin, M.: Round-optimal composable blind signatures in the common reference string model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 60-77
-
-
Fischlin, M.1
-
13
-
-
67049158194
-
Security of blind signatures under aborts
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Fischlin, M., Schröder, D.: Security of blind signatures under aborts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 297-316. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 297-316
-
-
Fischlin, M.1
Schröder, D.2
-
14
-
-
77954644602
-
On the impossibility of three-move blind signature schemes
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Fischlin, M., Schröder, D.: On the impossibility of three-move blind signature schemes. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 197-215. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 197-215
-
-
Fischlin, M.1
Schröder, D.2
-
15
-
-
38049020416
-
Concurrently-secure blind signatures without random oracles or setup assumptions
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hazay, C., Katz, J., Koo, C.-Y., Lindell, Y.: Concurrently-secure blind signatures without random oracles or setup assumptions. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 323-341. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 323-341
-
-
Hazay, C.1
Katz, J.2
Koo, C.-Y.3
Lindell, Y.4
-
16
-
-
38049159751
-
Universally-composable two-party computation in two rounds
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Horvitz, O., Katz, J.: Universally-composable two-party computation in two rounds. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 111-129. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 111-129
-
-
Horvitz, O.1
Katz, J.2
-
18
-
-
33748112416
-
Black-box constructions for secure computation
-
ACM Press, New York
-
Ishai, Y., Kushilevitz, E., Lindell, Y., Petrank, E.: Black-box constructions for secure computation. In: 38th Annual ACM Symposium on Theory of Computing (STOC), pp. 99-108. ACM Press, New York (2006)
-
(2006)
38th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 99-108
-
-
Ishai, Y.1
Kushilevitz, E.2
Lindell, Y.3
Petrank, E.4
-
19
-
-
84958591696
-
Security of blind digital signatures
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150-164. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
20
-
-
40249098611
-
Equivocal blind signatures and adaptive UC-security
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Kiayias, A., Zhou, H.-S.: Equivocal blind signatures and adaptive UC-security. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 340-355. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 340-355
-
-
Kiayias, A.1
Zhou, H.-S.2
-
21
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press, New York
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 33-43. ACM Press, New York (1989)
-
(1989)
21st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
22
-
-
33745554010
-
Efficient blind and partially blind signatures without random oracles
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80-99. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 80-99
-
-
Okamoto, T.1
-
23
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
24
-
-
35048815001
-
Notions of reducibility between cryptographic primitives
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Reingold, O., Trevisan, L., Vadhan, S.P.: Notions of reducibility between cryptographic primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.P.3
-
25
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM Press, New York
-
Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: 22nd Annual ACM Symposium on Theory of Computing (STOC), pp. 387-394. ACM Press, New York (1990)
-
(1990)
22nd Annual ACM Symposium on Theory of Computing (STOC)
, pp. 387-394
-
-
Rompel, J.1
|