-
1
-
-
14844295011
-
Direct anonymous attestation
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
E. Brickell, J. Camenisch, and L. Chen, "Direct Anonymous Attestation," Proc. 11th ACM Conf. Computer and Comm. Security, pp. 132-145, 2004. (Pubitemid 40338196)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
2
-
-
84863342926
-
-
Trusted Computing Group Website
-
Trusted Computing Group Website, http://www. trustedcomputinggroup.org, 2011.
-
(2011)
-
-
-
3
-
-
14844325627
-
-
Trusted Computing Group
-
Trusted Computing Group, "TCG TPM Specification 1.2," http://www.trustedcomputinggroup.org, 2003.
-
(2003)
TCG TPM Specification 1.2
-
-
-
6
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A Practical and Provably Secure Coalition-Resistant Group Signature Scheme," Proc. Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '00), pp. 255-270, 2000.
-
(2000)
Proc. Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '00)
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
7
-
-
35048887476
-
Short group signatures
-
D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '04), pp. 41-55, 2004.
-
(2004)
Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '04)
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology - CRYPTO '97
-
J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups," Proc. Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 410-424, 1997. (Pubitemid 127112569)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
10
-
-
84957649548
-
Identity escrow
-
Advances in Cryptology - CRYPTO '98
-
J. Kilian and E. Petrank, "Identity Escrow," Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '98), pp. 169-185, 1998. (Pubitemid 128119004)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
11
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
J. Camenisch and A. Lysyanskaya, "An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '01), pp. 93-118, 2001. (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
14
-
-
84937429196
-
Efficient revocation in group Signatures
-
Public Key Cryptography
-
E. Bresson and J. Stern, "Efficient Revocation in Group Signatures," Proc. Fourth Int'l Workshop Practice and Theory in Public Key Cryptography, pp. 190-206, 2001. (Pubitemid 33232943)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 190-206
-
-
Bresson, E.1
Stern, J.2
-
17
-
-
84957043547
-
Quasi-efficient revocation in group signatures
-
G. Ateniese, D.X. Song, and G. Tsudik, "Quasi-Efficient Revocation in Group Signatures," Proc. Sixth Int'l Conf. Financial Cryptography, pp. 183-197, 2002.
-
(2002)
Proc. Sixth Int'l Conf. Financial Cryptography
, pp. 183-197
-
-
Ateniese, G.1
Song, D.X.2
Tsudik, G.3
-
18
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving users without TTPS
-
P.P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs," Proc. ACM Conf. Computer and Comm. Security, pp. 72-81, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
20
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, "Security and Composition of Multiparty Cryptographic Protocols," J. Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
24
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval and J. Stern, "Security Proofs for Signature Schemes," Proc. Ann. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '96), pp. 387-398, 1996. (Pubitemid 126071081)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
12344258539
-
Efficient identification and signatures for smart cards
-
C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards," J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
27
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Advances in Cryptology - CRYPTO '97
-
E. Fujisaki and T. Okamoto, "Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations," Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 16-30, 1997. (Pubitemid 127112542)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
28
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
D. Chaum, J.-H. Evertse, and J. van de Graaf, "An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations," Proc. Ann. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '87), pp. 127-141, 1987.
-
(1987)
Proc. Ann. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '87)
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.-H.2
Van De Graaf, J.3
-
31
-
-
84949198248
-
Gradual and verifiable release of a secret
-
E.F. Brickell, D. Chaum, I. Damgård, and J. van de Graaf, "Gradual and Verifiable Release of a Secret," Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '87), pp. 156-166, 1987.
-
(1987)
Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '87)
, pp. 156-166
-
-
Brickell, E.F.1
Chaum, D.2
Damgard, I.3
Van De Graaf, J.4
-
34
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
R. Cramer, I. Damgård, and B. Schoenmakers, "Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '94), pp. 174-187, 1994.
-
(1994)
Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '94)
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
35
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
A.K. Lenstra and E.R. Verheul, "Selecting Cryptographic Key Sizes," J. Cryptology, vol. 14, no. 4, pp. 255-293, 2001. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
37
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Advances in Cryptology - EUROCRYPT '98
-
M. Bellare, J.A. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '98), pp. 236-250, 1998. (Pubitemid 128081489)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
|