-
1
-
-
84955599449
-
How to date blind signatures
-
K. Kim, T. Matsumoto, Lecture Notes in Computer Science Springer New York, NY
-
M. Abe, and E. Fujisaki How to date blind signatures K. Kim, T. Matsumoto, Advances in Cryptology, Proceedings of the 1996 International Conference on the Theory and Applications of Cryptology and Information Security, Kyingju, Korea, November 3-5, 1996 Lecture Notes in Computer Science Vol. 1163 1996 Springer New York, NY
-
(1996)
Advances in Cryptology, Proceedings of the 1996 International Conference on the Theory and Applications of Cryptology and Information Security, Kyingju, Korea, November 3-5, 1996
, vol.1163
-
-
Abe, M.1
Fujisaki, E.2
-
2
-
-
84974652864
-
Provably secure partially blind signatures
-
M. Belhaire, Lecture Notes in Computer Science Springer New York, NY
-
M. Abe, and T. Okamoto Provably secure partially blind signatures M. Belhaire, Advances in Cryptology, Proceedings of 20th Annual Cryptology Conference, Santa Barbara, CA, August 20-24, 2000 Lecture Notes in Computer Science Vol. 1880 2000 Springer New York, NY
-
(2000)
Advances in Cryptology, Proceedings of 20th Annual Cryptology Conference, Santa Barbara, CA, August 20-24, 2000
, vol.1880
-
-
Abe, M.1
Okamoto, T.2
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
C.S. Laih, Lecture Notes in Computer Science Springer New York, NY
-
S. Al-Riyami, and K. Paterson Certificateless public key cryptography C.S. Laih, Advances in Cryptology, Proceedings of the 2003 International Conference on the Theory and Applications of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4, 2003 Lecture Notes in Computer Science Vol. 2894 2003 Springer New York, NY
-
(2003)
Advances in Cryptology, Proceedings of the 2003 International Conference on the Theory and Applications of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4, 2003
, vol.2894
-
-
Al-Riyami, S.1
Paterson, K.2
-
4
-
-
84947795531
-
An online, transferable e-cash payment system
-
B.K. Roy, E. Okamoto, Lecture Notes in Computer Science Springer New York, NY
-
R.S. Anand, and C.E. Madhavan An online, transferable e-cash payment system B.K. Roy, E. Okamoto, Progress in Cryptology, Proceedings of the 1st International Conference on Cryptology in India, Calcutta, India, December 10-13, 2000 Lecture Notes in Computer Science Vol. 1977 2000 Springer New York, NY
-
(2000)
Progress in Cryptology, Proceedings of the 1st International Conference on Cryptology in India, Calcutta, India, December 10-13, 2000
, vol.1977
-
-
Anand, R.S.1
Madhavan, C.E.2
-
5
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptography
-
R. Deng, P. Samarati, ACM Press New York, NY
-
M. Au, J. Chen, J. Liu, Y. Mu, D. Wong, and G. Yang Malicious KGC attacks in certificateless cryptography R. Deng, P. Samarati, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, March 20-22, 2007 2007 ACM Press New York, NY
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, March 20-22, 2007
-
-
Au, M.1
Chen, J.2
Liu, J.3
Mu, Y.4
Wong, D.5
Yang, G.6
-
6
-
-
84976585166
-
Compact e-cash from bounded accumulator
-
A. Masayuki, Lecture Notes in Computer Science Springer New York, NY
-
M. Au, Q. Wu, W. Susilo, and Y. Mu Compact e-cash from bounded accumulator A. Masayuki, Topics in Cryptology - CT-RSA 2007: The Cryptographer's Track at the RSA Conference 2007, San Francisco, CA, February 5-9, 2007 Lecture Notes in Computer Science Vol. 4377 2007 Springer New York, NY
-
(2007)
Topics in Cryptology - CT-RSA 2007: The Cryptographer's Track at the RSA Conference 2007, San Francisco, CA, February 5-9, 2007
, vol.4377
-
-
Au, M.1
Wu, Q.2
Susilo, W.3
Mu, Y.4
-
7
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press New York, NY
-
M. Bellare, and P. Rogaway Random oracles are practical: A paradigm for designing efficient protocols Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, November 3-5, 1993 1993 ACM Press New York, NY
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, November 3-5, 1993
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
85031771268
-
Everything provable is provable in zero-knowledge
-
S. Goldwasser, Lecture Notes in Computer Science Springer New York, NY
-
M. Ben-Or, O. Goldreich, S. Goldwasser, J. Hastad, J. Kilian, S. Micali, and P. Rogaway Everything provable is provable in zero-knowledge S. Goldwasser, Advances in Cryptology, Proceedings of the 8th International Cryptology Conference, Santa Barbara, CA, 1990 Lecture Notes in Computer Science Vol. 403 1990 Springer New York, NY
-
(1990)
Advances in Cryptology, Proceedings of the 8th International Cryptology Conference, Santa Barbara, CA, 1990
, vol.403
-
-
Ben-Or, M.1
Goldreich, O.2
Goldwasser, S.3
Hastad, J.4
Kilian, J.5
Micali, S.6
Rogaway, P.7
-
9
-
-
24944435537
-
Compact e-cash
-
R. Cramer, Lecture Notes in Computer Science Springer New York
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya Compact e-cash R. Cramer, Advances in Cryptology, 24th International Conference on the Theory and Applications of Cryptographic Techniques, Aarhuis, Denmark, May 22-26, 2005 Lecture Notes in Computer Science Vol. 3494 2005 Springer New York
-
(2005)
Advances in Cryptology, 24th International Conference on the Theory and Applications of Cryptographic Techniques, Aarhuis, Denmark, May 22-26, 2005
, vol.3494
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
10
-
-
85015684346
-
Divisible e-cash systems can be truly anonymous
-
M. Naor, Lecture Notes in Computer Science Springer New York NY
-
S. Canard, and A. Gouget Divisible e-cash systems can be truly anonymous M. Naor, Advances in Cryptology, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007 Lecture Notes in Computer Science Vol. 4514 2007 Springer New York NY
-
(2007)
Advances in Cryptology, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007
, vol.4514
-
-
Canard, S.1
Gouget, A.2
-
11
-
-
77955321165
-
Multiple denominations in e-cash with compact transaction data
-
R. Sion, Lecture Notes in Computer Science Springer New York, NY
-
S. Canard, and A. Gouget Multiple denominations in e-cash with compact transaction data R. Sion, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, January 25-28, 2010 Lecture Notes in Computer Science Vol. 6052 2010 Springer New York, NY
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, January 25-28, 2010
, vol.6052
-
-
Canard, S.1
Gouget, A.2
-
12
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R.L. Rivest, A.T. Sherman, Plenum Publishing New York, NY
-
D. Chaum Blind signatures for untraceable payments D. Chaum, R.L. Rivest, A.T. Sherman, Advances in Cryptology: Proceedings of Crypto 1982, Santa Barbara, CA, 1982 1983 Plenum Publishing New York, NY 199 203
-
(1983)
Advances in Cryptology: Proceedings of Crypto 1982, Santa Barbara, CA, 1982
, pp. 199-203
-
-
Chaum, D.1
-
13
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum Security without identification: transaction systems to make big brother obsolete Communications of the ACM 28 10 1985 1030 1044 (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
26444601400
-
Online cash checks
-
J.J. Quisquater, J. Vandewalle, Lecture Notes in Computer Science Springer New York, NY
-
D. Chaum Online cash checks J.J. Quisquater, J. Vandewalle, Advances in Cryptology: Proceedings of the Workshop on the Theory and Applications of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 Lecture Notes in Computer Science Vol. 434 1990 Springer New York, NY
-
(1990)
Advances in Cryptology: Proceedings of the Workshop on the Theory and Applications of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989
, vol.434
-
-
Chaum, D.1
-
15
-
-
26444573086
-
Two improved partially blind signature schemes from bilinear pairings
-
C. Boyd, J. González Nieto, Lecture Notes in Computer Science Springer New York, NY
-
S. Chow, L. Hui, S. Yiu, and K. Chow Two improved partially blind signature schemes from bilinear pairings C. Boyd, J. González Nieto, Proceedings of 10th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 4-6, 2005 Lecture Notes in Computer Science Vol. 3574 2005 Springer New York, NY
-
(2005)
Proceedings of 10th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 4-6, 2005
, vol.3574
-
-
Chow, S.1
Hui, L.2
Yiu, S.3
Chow, K.4
-
16
-
-
40249085730
-
Certificateless encryption schemes strongly secure in the standard model
-
Barcelona, Spain, March 9-12
-
Dent, A.; Libert, B.; and Paterson, K. Certificateless encryption schemes strongly secure in the standard model. In Proceedings of 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, 344-359.
-
(2008)
Proceedings of 11th International Workshop on Practice and Theory in Public-Key Cryptography
, pp. 344-359
-
-
Dent, A.1
Libert, B.2
Paterson, K.3
-
17
-
-
0142000186
-
Single-term divisible electronic coins
-
A. De Santis, Lecture Notes in Computer Science Springer New York, NY
-
T. Eng, and T. Okamoto Single-term divisible electronic coins A. De Santis, Advances in Cryptology, Proceedings of the 1994 Workshop on the Theory and Applications of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 Lecture Notes in Computer Science Vol. 950 1995 Springer New York, NY
-
(1995)
Advances in Cryptology, Proceedings of the 1994 Workshop on the Theory and Applications of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994
, vol.950
-
-
Eng, T.1
Okamoto, T.2
-
18
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A.M. Odlyzko, Lecture Notes in Computer Science Springer New York, NY
-
A. Fiat, and A. Shamir How to prove yourself: Practical solutions to identification and signature problems A.M. Odlyzko, Advances in Cryptology: Proceedings of Crypto 1986, Santa Barbara, CA, 1987 Lecture Notes in Computer Science Vol. 263 1987 Springer New York, NY
-
(1987)
Advances in Cryptology: Proceedings of Crypto 1986, Santa Barbara, CA, 1987
, vol.263
-
-
Fiat, A.1
Shamir, A.2
-
19
-
-
71549141994
-
Transferable constant-size fair e-cash
-
J.A. Garay, A. Miyaji, A. Otsuka, Lecture Notes in Computer Science Springer New York, NY
-
G. Fuchsbauer, D. Pointcheval, and D. Vergnaud Transferable constant-size fair e-cash J.A. Garay, A. Miyaji, A. Otsuka, Cryptology and Network Security: Proceedings of 8th International Conference on Cryptology and Network Security, Kanazawa, Japan, 2009 Lecture Notes in Computer Science Vol. 5888 2009 Springer New York, NY
-
(2009)
Cryptology and Network Security: Proceedings of 8th International Conference on Cryptology and Network Security, Kanazawa, Japan, 2009
, vol.5888
-
-
Fuchsbauer, G.1
Pointcheval, D.2
Vergnaud, D.3
-
20
-
-
33744787065
-
Efficient identity-based signatures and blind signatures
-
Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
-
Huang, Z.; Chen, K.; and Wang, Y. Efficient identity-based signatures and blind signatures. In Proceedings of 4th International Conference on Cryptology and Network Security, Xiamen, China, December 14-16, 2005, 120-133. (Pubitemid 43829598)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3810
, pp. 120-133
-
-
Huang, Z.1
Chen, K.2
Wang, Y.3
-
21
-
-
33744786523
-
On the security of a certificateless signature scheme
-
Xiamen, China, December 14-16
-
Huang, X.; Susilo, W.; Mu, Y.; and Zhang, F. On the security of a certificateless signature scheme. In 4th International Conference on Cryptology and Network Security, Xiamen, China, December 14-16, 2005, 13-25.
-
(2005)
4th International Conference on Cryptology and Network Security
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
22
-
-
38149080541
-
Certificateless signature revisited
-
Townsville, Australia, July 2-4
-
Huang, X.; Mu, Y.; Susilo, W.; Wong, D.; and Wu, W. Certificateless signature revisited. In Proceedings of 12th Australasian Conference on Information Security and Privacy, Townsville, Australia, July 2-4, 2007, 308-322.
-
(2007)
Proceedings of 12th Australasian Conference on Information Security and Privacy
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.4
Wu, W.5
-
23
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Brisbane, Australia, July 1-3
-
Hu, B.; Wong, D.; Zhang, Z.; and Deng, X. Key replacement attack against a generic construction of certificateless signature. In Proceedings of 11th Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 1-3, 2006.
-
(2006)
Proceedings of 11th Australasian Conference on Information Security and Privacy
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
24
-
-
84958591696
-
Security of blind digital signatures
-
C. Pomerance, Lecture Notes in Computer Science Springer New York, NY
-
A. Juels, M. Luby, and R. Ostrovsky Security of blind digital signatures C. Pomerance, Advances in Cryptology, Proceedings of 17th Annual Cryptology Conference, Santa Barbara, CA, August 17-21, 1997 Lecture Notes in Computer Science Vol. 1294 1997 Springer New York, NY
-
(1997)
Advances in Cryptology, Proceedings of 17th Annual Cryptology Conference, Santa Barbara, CA, August 17-21, 1997
, vol.1294
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
25
-
-
84927727752
-
Security proofs for signature schemes
-
U.M. Maurer, Lecture Notes in Computer Science Springer New York, NY
-
D. Pointcheval, and J. Stern Security proofs for signature schemes U.M. Maurer, Advances in Cryptology, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, 1996 Lecture Notes in Computer Science Vol. 1070 1996 Springer New York, NY
-
(1996)
Advances in Cryptology, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, 1996
, vol.1070
-
-
Pointcheval, D.1
Stern, J.2
-
26
-
-
84955579666
-
Provably secure blind signature schemes
-
K. Kim, T. Matsumoto, Lecture Notes in Computer Science Springer New York, NY
-
D. Pointcheval, and J. Stern Provably secure blind signature schemes K. Kim, T. Matsumoto, Advances in Cryptology, Proceedings of the 1996 International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-5, 1996 Lecture Notes in Computer Science Vol. 1163 1996 Springer New York, NY
-
(1996)
Advances in Cryptology, Proceedings of the 1996 International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-5, 1996
, vol.1163
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval, and J. Stern Security arguments for digital signatures and blind signatures Journal of Cryptology 13 3 2000 361 396
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
28
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
G.R. Blakely, D. Chaum, Lecture Notes in Computer Science Springer New York, NY
-
A. Shamir Identity based cryptosystems and signature schemes G.R. Blakely, D. Chaum, Advances in Cryptology, Proceedings of 4th Annual Cryptology Conference, Santa Barbara, CA, August 19-22, 1984 Lecture Notes in Computer Science Vol. 196 1995 Springer New York, NY
-
(1995)
Advances in Cryptology, Proceedings of 4th Annual Cryptology Conference, Santa Barbara, CA, August 19-22, 1984
, vol.196
-
-
Shamir, A.1
-
29
-
-
38549097531
-
Conditional e-cash
-
S. Dietrich, R. Dhamija, Lecture Notes in Computer Science Springer New York, NY
-
L. Shi, B. Carbunar, and R. Sion Conditional e-cash S. Dietrich, R. Dhamija, Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, Scarborough, Trinidad and Tobago, February 12-17, 2007 Lecture Notes in Computer Science Vol. 4886 2007 Springer New York, NY
-
(2007)
Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, Scarborough, Trinidad and Tobago, February 12-17, 2007
, vol.4886
-
-
Shi, L.1
Carbunar, B.2
Sion, R.3
-
30
-
-
54049124682
-
A certificateless restrictive partially blind signature scheme
-
August 15-17, Harbin, China
-
Wang, C.; and Lu, R. A certificateless restrictive partially blind signature scheme. In Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 15-17, Harbin, China, 2008, 279-282.
-
(2008)
Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 279-282
-
-
Wang, C.1
Lu, R.2
-
31
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Y. Zheng, Lecture Notes in Computer Science Springer New York, NY
-
F. Zhang, and K. Kim ID-based blind signature and ring signature from pairings Y. Zheng, Advances in Cryptology, Proceedings of the 2002 International Conference on the Theory and Applications of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002 Lecture Notes in Computer Science Vol. 2501 2002 Springer New York, NY
-
(2002)
Advances in Cryptology, Proceedings of the 2002 International Conference on the Theory and Applications of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002
, vol.2501
-
-
Zhang, F.1
Kim, K.2
-
32
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
R. Safavi-Naini, J. Seberry, Lecture Notes in Computer Science Springer New York, NY
-
F. Zhang, and K. Kim Efficient ID-based blind signature and proxy signature from bilinear pairings R. Safavi-Naini, J. Seberry, Proceedings of 8th Australasian Conference on Information Security and Privacy, Woolongong, Australia, July 9-11, 2003 Lecture Notes in Computer Science 2003 Springer New York, NY
-
(2003)
Proceedings of 8th Australasian Conference on Information Security and Privacy, Woolongong, Australia, July 9-11, 2003
-
-
Zhang, F.1
Kim, K.2
-
33
-
-
51249113617
-
A new provably secure certificateless signature scheme
-
Beijing, China, May 19-23, 2008, IEEE Computing Society, Los Alamitos, CA
-
Zhang, L.; and Zhang, F. A new provably secure certificateless signature scheme. In Proceedings of IEEE International Conference on Communications, Beijing, China, May 19-23, 2008, IEEE Computing Society, Los Alamitos, CA, 2008.
-
(2008)
Proceedings of IEEE International Conference on Communications
-
-
Zhang, L.1
Zhang, F.2
-
34
-
-
77952781158
-
Certificateless partially blind signatures
-
Nanjing, China, December 26-29
-
Zhang, L.; and Zhang, F. Certificateless partially blind signatures. In Proceedings of the 1st International Conference on Information Science and Engineering, Nanjing, China, December 26-29, 2009, 2883-2886.
-
(2009)
Proceedings of the 1st International Conference on Information Science and Engineering
, pp. 2883-2886
-
-
Zhang, L.1
Zhang, F.2
-
35
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
J. Zhou, M. Yung, F. Bao, Lecture Notes in Computer Science Springer New York, NY
-
Z. Zhang, D. Wong, J. Xu, and D. Feng Certificateless public-key signature: Security model and efficient construction J. Zhou, M. Yung, F. Bao, Proceedings of 4th International Conference on Applied Cryptography and Network Security, Singapore, June 6-9, 2006 Lecture Notes in Computer Science Vol. 3989 2006 Springer New York, NY
-
(2006)
Proceedings of 4th International Conference on Applied Cryptography and Network Security, Singapore, June 6-9, 2006
, vol.3989
-
-
Zhang, Z.1
Wong, D.2
Xu, J.3
Feng, D.4
-
36
-
-
73149101252
-
Simulatable certificateless two-party authenticated key agreement protocol
-
L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer Simulatable certificateless two-party authenticated key agreement protocol Information Sciences 180 6 2010 1020 1030
-
(2010)
Information Sciences
, vol.180
, Issue.6
, pp. 1020-1030
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
Domingo-Ferrer, J.4
|