-
1
-
-
79959315979
-
Double-trapdoor anonymous tags for traceable signatures
-
Lopez, J., Tsudik, G. eds., Springer, Heidelberg
-
Abe, M., Chow, S. S. M., Haralambiev, K., Ohkubo, M.: Double-Trapdoor Anonymous Tags for Traceable Signatures. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 183-200. Springer, Heidelberg (2011)
-
(2011)
ACNS 2011. LNCS
, vol.6715
, pp. 183-200
-
-
Abe, M.1
Chow, S.S.M.2
Haralambiev, K.3
Ohkubo, M.4
-
2
-
-
77956996315
-
Structure-preserving signatures and commitments to group elements
-
Rabin, T. ed., Springer, Heidelberg
-
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
3
-
-
80051981601
-
Optimal structure-preserving signatures in asymmetric bilinear groups
-
Rogaway, P. ed., Springer, Heidelberg
-
Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 649-666. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 649-666
-
-
Abe, M.1
Groth, J.2
Haralambiev, K.3
Ohkubo, M.4
-
4
-
-
72449208074
-
A framework for universally composable non-committing blind signatures
-
Matsui, M. ed., Springer, Heidelberg
-
Abe, M., Ohkubo, M.: A Framework for Universally Composable Non-Committing Blind Signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 435-450. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 435-450
-
-
Abe, M.1
Ohkubo, M.2
-
6
-
-
35048881545
-
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols
-
Franklin, M. ed., Springer, Heidelberg
-
Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
7
-
-
84957634529
-
Breaking RSA may not be equivalent to factoring
-
Advances in Cryptology - EUROCRYPT '98
-
Boneh, D., Venkatesan, R.: Breaking RSA May Not be Equivalent to Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 59-71. Springer, Heidelberg (1998) (Pubitemid 128081476)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
8
-
-
43149115190
-
Separation results on the 'one-more' computational problems
-
DOI 10.1007/978-3-540-79263-5-5, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Bresson, E., Monnerat, J., Vergnaud, D.: Separation Results on the "One-More" Computational Problems. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 71-87. Springer, Heidelberg (2008) (Pubitemid 351641977)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4964
, pp. 71-87
-
-
Bresson, E.1
Monnerat, J.2
Vergnaud, D.3
-
9
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. ed., Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
72449167369
-
Group encryption: Non-interactive realization in the standard model
-
Matsui, M. ed., Springer, Heidelberg
-
Cathalo, J., Libert, B., Yung, M.: Group Encryption: Non-Interactive Realization in the Standard Model. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 179-196. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 179-196
-
-
Cathalo, J.1
Libert, B.2
Yung, M.3
-
11
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
Knudsen, L. R. ed., Springer, Heidelberg
-
Coron, J.-S.: Optimal Security Proofs for PSS and Other Signature Schemes. In: Knudsen, L. R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272-287. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
12
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Feigenbaum, J. ed., Springer, Heidelberg
-
Damgård, I.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445-456. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991. LNCS
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
14
-
-
33745155794
-
On the generic insecurity of the full domain hash
-
Shoup, V. ed., Springer, Heidelberg
-
Dodis, Y., Oliveira, R., Pietrzak, K.: On the Generic Insecurity of the Full Domain Hash. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 449-466. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 449-466
-
-
Dodis, Y.1
Oliveira, R.2
Pietrzak, K.3
-
15
-
-
77954644602
-
On the impossibility of three-move blind signature schemes
-
Gilbert, H. ed., Springer, Heidelberg
-
Fischlin, M., Schröder, D.: On the Impossibility of Three-Move Blind Signature Schemes. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 197-215. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 197-215
-
-
Fischlin, M.1
Schröder, D.2
-
16
-
-
77957002759
-
Automorphic signatures in bilinear groups
-
Fuchsbauer, G.: Automorphic signatures in bilinear groups. ePrint 2009/320(2009)
-
(2009)
EPrint 2009/320
-
-
Fuchsbauer, G.1
-
17
-
-
79958011640
-
Commuting signatures and verifiable encryption
-
Paterson, K. G. ed., Springer, Heidelberg
-
Fuchsbauer, G.: Commuting Signatures and Verifiable Encryption. In: Paterson, K. G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 224-245. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 224-245
-
-
Fuchsbauer, G.1
-
19
-
-
51849109415
-
Improved bounds on security reductions for discrete log based signatures
-
Wagner, D. ed., Springer, Heidelberg
-
Garg, S., Bhaskar, R., Lokam, S. V.: Improved Bounds on Security Reductions for Discrete Log Based Signatures. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 93-107. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 93-107
-
-
Garg, S.1
Bhaskar, R.2
Lokam, S.V.3
-
20
-
-
33644600483
-
Bounds on the efficiency of generic cryptographic constructions
-
Gennaro, R., Gertner, Y., Katz, J., Trevisan, L.: Bounds on the efficiency of generic cryptographic constructions. SIAM J. Comput. 35(1), 217-246(2005)
-
(2005)
SIAM J. Comput.
, vol.35
, Issue.1
, pp. 217-246
-
-
Gennaro, R.1
Gertner, Y.2
Katz, J.3
Trevisan, L.4
-
21
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comp. 17(2), 281-308(1988)
-
(1988)
SIAM J. Comp
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
22
-
-
58349109585
-
Universally composable adaptive oblivious transfer
-
Pieprzyk, J. ed., Springer, Heidelberg
-
Green, M., Hohenberger, S.: Universally Composable Adaptive Oblivious Transfer. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 179-197. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 179-197
-
-
Green, M.1
Hohenberger, S.2
-
23
-
-
77649262306
-
Simulation-sound nizk proofs for a practical language and constant size group signatures
-
Lai, X., Chen, K. eds., Springer, Heidelberg
-
Groth, J.: Simulation-Sound Nizk Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
24
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Sahai, A.: Efficient Non-Interactive Proof Systems for Bilinear Groups. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008) (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
25
-
-
33750051523
-
On the existence of 3-round zero-knowledge protocols
-
Krawczyk, H. ed., Springer, Heidelberg, Full version available from IACR e-print archive 1999/009
-
Hada, S., Tanaka, T.: On the Existence of 3-Round Zero-Knowledge Protocols. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 369-408. Springer, Heidelberg (1998); Full version available from IACR e-print archive 1999/009
-
(1998)
CRYPTO 1998. LNCS
, vol.1462
, pp. 369-408
-
-
Hada, S.1
Tanaka, T.2
-
26
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
ACM
-
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC 1989, pp. 44-61. ACM (1989)
-
(1989)
STOC 1989
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
27
-
-
79953224070
-
Impossibility of blind signatures from one-way permutations
-
Ishai, Y. ed., Springer, Heidelberg
-
Katz, J., Schröder, D., Yerukhimovich, A.: Impossibility of Blind Signatures from One-Way Permutations. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 615-629. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 615-629
-
-
Katz, J.1
Schröder, D.2
Yerukhimovich, A.3
-
28
-
-
33745521850
-
Generalized environmental security from number theoretic assumptions
-
DOI 10.1007/11681878-18, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Malkin, T., Moriarty, R., Yakovenko, N.: Generalized Environmental Security from Number Theoretic Assumptions. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 343-359. Springer, Heidelberg (2006) (Pubitemid 43979857)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3876
, pp. 343-359
-
-
Malkin, T.1
Moriarty, R.2
Yakovenko, N.3
-
29
-
-
78650717533
-
Impossibility proofs for RSA signatures in the standard model
-
Abe, M. ed., Springer, Heidelberg
-
Paillier, P.: Impossibility Proofs for RSA Signatures in the Standard Model. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 31-48. Springer, Heidelberg (2006)
-
(2006)
CT-RSA 2007. LNCS
, vol.4377
, pp. 31-48
-
-
Paillier, P.1
-
30
-
-
33646784002
-
Discrete-log-based signatures may not be equivalent to discrete log
-
DOI 10.1007/11593447-1, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Paillier, P., Vergnaud, D.: Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 1-20. Springer, Heidelberg (2005) (Pubitemid 43763466)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3788
, pp. 1-20
-
-
Paillier, P.1
Vergnaud, D.2
-
31
-
-
77649259271
-
Trading one-wayness against chosen-ciphertext security in factoring-based encryption
-
Lai, X., Chen, K. eds., Springer, Heidelberg
-
Paillier, P., Villar, J. L.: Trading One-Wayness against Chosen-Ciphertext Security in Factoring-Based Encryption. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 252-266. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 252-266
-
-
Paillier, P.1
Villar, J.L.2
-
32
-
-
79959706334
-
Limits of provable security from standard assumptions
-
ACM
-
Pass, R.: Limits of provable security from standard assumptions. In: STOC 2011, pp. 109-118. ACM (2011)
-
(2011)
STOC 2011
, pp. 109-118
-
-
Pass, R.1
-
33
-
-
84947798969
-
Notions of reducibility between cryptographic primitives
-
Naor, M. ed., Springer, Heidelberg
-
Reingold, O., Trevisan, L., Vadhan, S. P.: Notions of Reducibility Between Cryptographic Primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.P.3
-
34
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Advances in Cryptology - EUROCRYPT '98
-
Simon, D. R.: Finding Collisions on a One-Way Street: Can Secure Hash Functions be Based on General Assumptions? In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 334-345. Springer, Heidelberg (1998) (Pubitemid 128081496)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 334-345
-
-
Simon, D.R.1
|