-
1
-
-
77956996315
-
Structure- Preserving Signatures and Commitments to Group Elements
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure- Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
2
-
-
80051981601
-
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 649-666. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 649-666
-
-
Abe, M.1
Groth, J.2
Haralambiev, K.3
Ohkubo, M.4
-
3
-
-
72449208074
-
A Framework for Universally Composable Non-committing Blind Signatures
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Abe, M., Ohkubo, M.: A Framework for Universally Composable Non-committing Blind Signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 435-450. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 435-450
-
-
Abe, M.1
Ohkubo, M.2
-
4
-
-
40249111589
-
P-signatures and Noninteractive Anonymous Credentials
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and Noninteractive Anonymous Credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356-374. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 356-374
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
5
-
-
35248843604
-
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology 21(2), 149-177 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
35048887476
-
Short Group Signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
58349085879
-
Efficient Protocols for Set Membership and Range Proofs
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Camenisch, J., Chaabouni, R., Shelat, A.: Efficient Protocols for Set Membership and Range Proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234-252. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 234-252
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
10
-
-
67650691588
-
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Camenisch, J., Chandran, N., Shoup, V.: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 351-368
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
11
-
-
79952510570
-
Oblivious Transfer with Hidden Access Control Policies
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Camenisch, J., Dubovitskaya, M., Neven, G., Zaverucha, G.M.: Oblivious Transfer with Hidden Access Control Policies. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 192-209. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 192-209
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
Zaverucha, G.M.4
-
12
-
-
82955177038
-
Structure Preserving CCA Secure Encryption and Applications
-
Lee, D.H. (ed.) ASIACRYPT 2011. Springer, Heidelberg
-
Camenisch, J., Haralambiev, K., Kohlweiss, M., Lapon, J., Naessens, V.: Structure Preserving CCA Secure Encryption and Applications. In: Lee, D.H. (ed.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 89-106. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 89-106
-
-
Camenisch, J.1
Haralambiev, K.2
Kohlweiss, M.3
Lapon, J.4
Naessens, V.5
-
13
-
-
24944435537
-
Compact E-Cash
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
14
-
-
67650686038
-
On the Portability of Generalized Schnorr Proofs
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Camenisch, J., Kiayias, A., Yung, M.: On the Portability of Generalized Schnorr Proofs. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 425-442. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 425-442
-
-
Camenisch, J.1
Kiayias, A.2
Yung, M.3
-
15
-
-
72449167369
-
Group Encryption: Non-interactive Realization in the Standard Model
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Cathalo, J., Libert, B., Yung, M.: Group Encryption: Non-interactive Realization in the Standard Model. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 179-196. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 179-196
-
-
Cathalo, J.1
Libert, B.2
Yung, M.3
-
16
-
-
84859996858
-
A domain transformation for structure-preserving signatures on group elements
-
ePrint Archive, Report 2011/342
-
Chase, M., Kohlweiss, M.: A domain transformation for structure-preserving signatures on group elements. Cryptology ePrint Archive, Report 2011/342 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Chase, M.1
Kohlweiss, M.2
-
18
-
-
78650817944
-
Efficient Public-Key Cryptography in the Presence of Key Leakage
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient Public-Key Cryptography in the Presence of Key Leakage. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 613-631. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 613-631
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
19
-
-
85028450627
-
Non-malleable cryptography
-
ACM Press
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: 23rd ACM STOC, pp. 542-552. ACM Press (1991)
-
(1991)
23rd ACM STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
20
-
-
33749544519
-
Round-Optimal Composable Blind Signatures in the Common Reference String Model
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Fischlin, M.: Round-Optimal Composable Blind Signatures in the Common Reference String Model. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 60-77. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 60-77
-
-
Fischlin, M.1
-
21
-
-
77957002759
-
Automorphic signatures in bilinear groups and an application to round-optimal blind signatures
-
ePrint Archive, Report 2009/320
-
Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive, Report 2009/320 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology
-
-
Fuchsbauer, G.1
-
22
-
-
58349109585
-
Universally Composable Adaptive Oblivious Transfer
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Green, M., Hohenberger, S.: Universally Composable Adaptive Oblivious Transfer. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 179-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 179-197
-
-
Green, M.1
Hohenberger, S.2
-
23
-
-
79953182091
-
Practical adaptive oblivious transfer from simple assumptions
-
ePrint Archive, Report 2010/109
-
Green, M., Hohenberger, S.: Practical adaptive oblivious transfer from simple assumptions. Cryptology ePrint Archive, Report 2010/109 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology
-
-
Green, M.1
Hohenberger, S.2
-
24
-
-
77649262306
-
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
25
-
-
44449140946
-
Efficient Non-interactive Proof Systems for Bilinear Groups
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
26
-
-
72449205531
-
Signature Schemes with Bounded Leakage Resilience
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Signature Schemes with Bounded Leakage Resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
27
-
-
35248818856
-
On Cryptographic Assumptions and Challenges
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Naor, M.: On Cryptographic Assumptions and Challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 96-109
-
-
Naor, M.1
|