-
1
-
-
84955599449
-
How to date blind signatures
-
Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. Springer, Heidelberg
-
Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244-251. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
2
-
-
77956996315
-
Structure- Preserving Signatures and Commitments to Group Elements
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure- Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
3
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
5
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
6
-
-
40249111589
-
P-signatures and noninteractive anonymous credentials
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Belenkiy, M., Chase,M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 356-374
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
7
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
ACM Press, New York
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC, pp. 103-112. ACM Press, New York (1988)
-
(1988)
STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
8
-
-
79952504693
-
Signatures on randomizable ciphertexts
-
Gennaro, R. (ed.) PKC 2011. Springer, Heidelberg
-
Blazy, O., Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Signatures on randomizable ciphertexts. In: Gennaro, R. (ed.) PKC 2011. LNCS, vol. 6571, pp. 403-422. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 403-422
-
-
Blazy, O.1
Fuchsbauer, G.2
Pointcheval, D.3
Vergnaud, D.4
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Bellare, M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
12
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Boyen, X., Waters, B.: Full-domain subgroup hiding and constant-size group signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
0020915882
-
Blind signatures for untraceable payments
-
Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Plenum Press, New York
-
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) CRYPTO 1982, pp. 199-203. Plenum Press, New York (1983)
-
(1983)
CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030-1044 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
33749578123
-
On signatures of knowledge
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Chase, M., Lysyanskaya, A.: On signatures of knowledge. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 78-96. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 78-96
-
-
Chase, M.1
Lysyanskaya, A.2
-
19
-
-
85031802442
-
Payment systems and credential mechanisms with provable security against abuse by individuals
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
Damg̊ard, I.: Payment systems and credential mechanisms with provable security against abuse by individuals. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 328-335. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 328-335
-
-
Damg̊ard, I.1
-
20
-
-
78751485079
-
Cryptography against continuous memory attacks
-
IEEE Computer Society, Los Alamitos
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS, pp. 511-520. IEEE Computer Society, Los Alamitos (2010)
-
(2010)
FOCS
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
21
-
-
33749544519
-
Round-optimal composable blind signatures in the common reference string model
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Fischlin,M.: Round-optimal composable blind signatures in the common reference string model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 60-77
-
-
Fischlin, M.1
-
22
-
-
52149107370
-
Anonymous proxy signatures
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201-217. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 201-217
-
-
Fuchsbauer, G.1
Pointcheval, D.2
-
23
-
-
71549141994
-
Transferable constant-size fair E-cash
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable constant-size fair E-cash. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226-247. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 226-247
-
-
Fuchsbauer, G.1
Pointcheval, D.2
Vergnaud, D.3
-
24
-
-
77957002759
-
Automorphic signatures in bilinear groups and an application to round-optimal blind signatures
-
ePrint Archive, Report 2009/320 an extended abstract appeared as part of [AFG+10]
-
Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive, Report 2009/320 (2009), http://eprint.iacr.org/2009/320, an extended abstract appeared as part of [AFG+10]
-
(2009)
Cryptology
-
-
Fuchsbauer, G.1
-
25
-
-
77957009154
-
Commuting signatures and verifiable encryption and an application to non-interactively delegatable credentials
-
ePrint Archive, Report 2010/233
-
Fuchsbauer, G.: Commuting signatures and verifiable encryption and an application to non-interactively delegatable credentials. Cryptology ePrint Archive, Report 2010/233 (2010), http://eprint.iacr.org/2010/233
-
(2010)
Cryptology
-
-
Fuchsbauer, G.1
-
26
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Groth, J., Ostrovsky, R., Sahai, A.: Perfect non-interactive zero knowledge for NP. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 339-358. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
27
-
-
53249117524
-
Pairings for cryptographers
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discrete Applied Mathematics 156(16), 3113-3121 (2008)
-
(2008)
Discrete Applied Mathematics
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
28
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
29
-
-
67651053584
-
Pseudonym systems
-
Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
30
-
-
84955579666
-
Provably secure blind signature schemes
-
Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. Springer, Heidelberg
-
Pointcheval, D., Stern, J.: Provably secure blind signature schemes. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 252-265. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1163
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
31
-
-
69949156953
-
Security of verifiably encrypted signatures and a construction without random oracles
-
Shacham, H., Waters, B. (eds.) Pairing 2009. Springer, Heidelberg
-
Rückert, M., Schröder, D.: Security of verifiably encrypted signatures and a construction without random oracles. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 17-34. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5671
, pp. 17-34
-
-
Rückert, M.1
Schröder, D.2
|