-
1
-
-
84873963079
-
Secret handshakes with dynamic and fuzzy matching
-
Ateniese, G., Kirsch, J., Blanton, M.: Secret Handshakes with Dynamic and Fuzzy Matching. In: Network and Distributed System Security Symposium, NDSS 2007 (2007)
-
(2007)
Network and Distributed System Security Symposium, NDSS 2007
-
-
Ateniese, G.1
Kirsch, J.2
Blanton, M.3
-
2
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE CS, Los Alamitos
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy 2003, pp. 180-196. IEEE CS, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy 2003
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
3
-
-
84949210733
-
The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
-
Syverson, P.F. (ed.) FC 2001. Springer, Heidelberg
-
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 309-328. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2339
, pp. 309-328
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
5
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Algorithmic Number Theory
-
Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998) (Pubitemid 128093541)
-
(1998)
LNCS
, Issue.1423
, pp. 48-63
-
-
Boneh, D.1
-
6
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107-122. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
7
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
-
(2001)
LNCS
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
35048855095
-
Secret handshakes from CA-oblivious encryption
-
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret Handshakes from CA-Oblivious Encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004) (Pubitemid 39747761)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
9
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum Press, New York
-
Chaum, D.: Blind Signatures for Untraceable Payments. In: CRYPTO 1982, pp. 199-203. Plenum Press, New York (1983)
-
(1983)
CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
10
-
-
84957695516
-
Securing traceability of ciphertexts - Towards a secure software key escrow system (extended abstract)
-
Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
-
Desmedt, Y.: Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 147-157. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 147-157
-
-
Desmedt, Y.1
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
34547142883
-
Robust and efficient sharing of RSA functions
-
Gennaro, R., Rabin, T., Jarecki, S., Krawczyk, H.: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3), 393 (2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.3
, pp. 393
-
-
Gennaro, R.1
Rabin, T.2
Jarecki, S.3
Krawczyk, H.4
-
13
-
-
34547207796
-
RSA-based undeniable signatures
-
Gennaro, R., Rabin, T., Krawczyk, H.: RSA-Based Undeniable Signatures. J. Cryptology 20(3), 394 (2007)
-
(2007)
J. Cryptology
, vol.20
, Issue.3
, pp. 394
-
-
Gennaro, R.1
Rabin, T.2
Krawczyk, H.3
-
14
-
-
84867284322
-
Group secret handshakes or affiliation-hiding authenticated group key agreement
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Jarecki, S., Kim, J., Tsudik, G.: Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 287-308. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 287-308
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
15
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
DOI 10.1007/978-3-540-79263-5-23, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008) (Pubitemid 351641994)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
16
-
-
38049060325
-
Unlinkable secret handshakes and key-private group key management schemes
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 270-287
-
-
Jarecki, S.1
Liu, X.2
-
17
-
-
70350325165
-
Private mutual authentication and conditional oblivious transfer
-
Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 90-107
-
-
Jarecki, S.1
Liu, X.2
-
18
-
-
70350647637
-
Secret handshake: Strong anonymity definition and construction
-
Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
-
Kawai, Y., Yoneyama, K., Ohta, K.: Secret Handshake: Strong Anonymity Definition and Construction. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 219-229. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5451
, pp. 219-229
-
-
Kawai, Y.1
Yoneyama, K.2
Ohta, K.3
-
19
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
Lamacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
20
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
21
-
-
49049098105
-
A flexible framework for secret handshakes
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 295-315
-
-
Tsudik, G.1
Xu, S.2
-
22
-
-
33746772091
-
RSA-based secret handshakes
-
Coding and Cryptography - International Workshop, WCC 2005, Revised Selected Papers
-
Vergnaud, D.: RSA-Based Secret Handshakes. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 252-274. Springer, Heidelberg (2006) (Pubitemid 44165469)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3969
, pp. 252-274
-
-
Vergnaud, D.1
-
23
-
-
14844289583
-
k-anonymous secret handshakes with reusable credentials
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Xu, S., Yung, M.: k-Anonymous Secret Handshakes with Reusable Credentials. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 158-167. ACM, New York (2004) (Pubitemid 40347107)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 158-167
-
-
Xu, S.1
Yung, M.2
|