-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
volume 1880 of Lecture Notes in Computer Science, Springer
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer, 2000.
-
(2000)
CRYPTO
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
33749993205
-
Constant-size dynamic k-TAA
-
volume 4116 of Lecture Notes in Computer Science, Springer
-
M. H. Au, W. Susilo, and Y. Mu. Constant-Size Dynamic k-TAA. In SCN, volume 4116 of Lecture Notes in Computer Science, pages 111-125. Springer, 2006.
-
(2006)
SCN
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
7
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital sinatures (extended abstract)
-
J. C. Benaloh and M. de Mare. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). In EUROCRYPT, pages 274-285, 1993.
-
(1993)
EUROCRYPT
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
8
-
-
35048887476
-
Short group signatures
-
volume 3152 of Lecture Notes in Computer Science
-
D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 41-55, 2004.
-
(2004)
CRYPTO
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
9
-
-
58349085879
-
Efficient protocols for set membership and range proofs
-
volume 5350 of Lecture Notes in Computer Science, Springer
-
J. Camenisch, R. Chaabouni, and A. Shelat. Efficient Protocols for Set Membership and Range Proofs. In ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 234-252. Springer, 2008.
-
(2008)
ASIACRYPT
, pp. 234-252
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
10
-
-
35248839965
-
A signature scheme with efficient protocols
-
volume 2576 of Lecture Notes in Computer Science, Springer
-
J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. In SCN, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer, 2002.
-
(2002)
SCN
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
volume 3152 of Lecture Notes in Computer Science
-
J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. In CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 56-72, 2004.
-
(2004)
CRYPTO
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
84958612917
-
Efficient group signature schemes for large groups (extended abstract)
-
B. S. K. Jr., editor, volume 1294 of Lecture Notes in Computer Science, Springer
-
J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, CRYPTO, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
-
(1997)
CRYPTO
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
85024290278
-
Group signatures
-
D. Chaum and E. van Heyst. Group Signatures. In EUROCRYPT, pages 257-265, 1991.
-
(1991)
EUROCRYPT
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
14
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. Desmedt, editor, volume 839 of Lecture Notes in Computer Science
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt, editor, CRYPTO, volume 839 of Lecture Notes in Computer Science, pages 174-187, 1994.
-
(1994)
CRYPTO
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18(1):186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
17
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput., 17(2):281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
18
-
-
77955455561
-
Making a nymbler nymble using VERBS
-
volume 6205 of Lecture Notes in Computer Science
-
R. Henry, K. Henry, and I. Goldberg. Making a Nymbler Nymble Using VERBS. In Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, pages 111-129, 2010.
-
(2010)
Privacy Enhancing Technologies
, pp. 111-129
-
-
Henry, R.1
Henry, K.2
Goldberg, I.3
-
19
-
-
38149012971
-
Nymble: Anonymous IP-address blocking
-
volume 4776 of Lecture Notes in Computer Science, Springer
-
P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-Address Blocking. In Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 113-133. Springer, 2007.
-
(2007)
Privacy Enhancing Technologies
, pp. 113-133
-
-
Johnson, P.C.1
Kapadia, A.2
Tsang, P.P.3
Smith, S.W.4
-
20
-
-
35048841283
-
Traceable signatures
-
C. Cachin and J. Camenisch, editors, volume 3027 of Lecture Notes in Computer Science,rftxt Springer
-
A. Kiayias, Y. Tsiounis, and M. Yung. Traceable Signatures. In C. Cachin and J. Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 571-589. Springer, 2004.
-
(2004)
EUROCRYPT
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
21
-
-
78650209785
-
Jack: Scalable accumulator-based Nymble system
-
Z. Lin and N. Hopper. Jack: Scalable accumulator-based Nymble system. In WPES, pages 53-62, 2010.
-
(2010)
WPES
, pp. 53-62
-
-
Lin, Z.1
Hopper, N.2
-
23
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
volume 576 of LNCS
-
T. P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In CRYPTO'91, volume 576 of LNCS, pages 129-140, 1992.
-
(1992)
CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
24
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving users without TTPs
-
ACM
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs. In ACM Conference on Computer and Communications Security, pages 72-81. ACM, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
25
-
-
70349290797
-
PEREA: Towards practical TTP-free revocation in anonymous authentication
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. In ACM Conference on Computer and Communications Security, pages 333-344, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 333-344
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
26
-
-
78651408573
-
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur., 13(4):39, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 39
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
27
-
-
78751656582
-
Nymble: Blocking misbehaving users in anonymizing networks
-
P. P. Tsang, A. Kapadia, C. Cornelius, and S. W. Smith. Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Trans. Dependable Sec. Comput., 8(2):256-269, 2011.
-
(2011)
IEEE Trans. Dependable Sec. Comput.
, vol.8
, Issue.2
, pp. 256-269
-
-
Tsang, P.P.1
Kapadia, A.2
Cornelius, C.3
Smith, S.W.4
|