-
1
-
-
84946833891
-
How to Leak a Secret
-
Advances in Cryptology - ASIACRYPT 2001
-
Rivest, R.L., Shamir, A. and Tauman, Y. (2001) How to Leak a Secret. ASIACRYPT 2001, Lecture Notes in Computer Science 2248, pp. 552-565. Springer. (Pubitemid 33371206)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
2
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
Springer
-
Abe, M., Ohkubo, M. and Suzuki, K. (2002) 1-out-of-n Signatures from a Variety of Keys. ASIACRYPT 2002, Lecture Notes in Computer Science 2501, pp. 415-432. Springer.
-
(2002)
ASIACRYPT 2002, Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
3
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Springer
-
Zhang, F. and Kim, K. (2002) ID-Based Blind Signature and Ring Signature from Pairings. ASIACRYPT 2002, Lecture Notes in Computer Science 2501, pp. 533-547. Springer.
-
(2002)
ASIACRYPT 2002, Lecture Notes in Computer Science
, vol.2501
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
4
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Springer
-
Boneh, D., Gentry, C., Lynn, B. and Shacham, H. (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003, Lecture Notes in Computer Science 2656, pp. 416-432. Springer.
-
(2003)
EUROCRYPT 2003, Lecture Notes in Computer Science 2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
0142218983
-
On the rs-code construction of ring signature schemes and a threshold setting of rst. ICICS 2003
-
Springer
-
Wong, D.S., Fung, K., Liu, J.K. and Wei, V.K. (2003) On the rs-code construction of ring signature schemes and a threshold setting of rst. ICICS 2003, Lecture Notes in Computer Science 2836, pp. 34-46. Springer.
-
(2003)
Lecture Notes in Computer Science
, vol.2836
, pp. 34-46
-
-
Wong, D.S.1
Fung, K.2
Liu, J.K.3
Wei, V.K.4
-
6
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Springer
-
Dodis, Y., Kiayias, A., Nicolosi, A. and Shoup, V. (2004) Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004, Lecture Notes in Computer Science 3027, pp. 609-626. Springer.
-
(2004)
EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
7
-
-
26444540788
-
Efficient identity based ring signature
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Chow, S.S.M., Yiu, S.-M. and Hui, L.C.K. (2005) Efficient Identity Based Ring Signature. ACNS 2005, Lecture Notes in Computer Science 3531, pp. 499-512. Also available at Cryptology ePrint Archive, Report 2004/327. (Pubitemid 41422135)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 499-512
-
-
Chow, S.S.M.1
Yiu, S.-M.2
Hui, L.C.K.3
-
8
-
-
85024290278
-
-
Group Signatures. In Davies, D.W. (ed.), Springer
-
Chaum, D. and vanHeyst, E. (1991) Group Signatures. In Davies, D.W. (ed.), EUROCRYPT 1991, Lecture Notes in Computer Science 547, pp. 257-265. Springer.
-
(1991)
EUROCRYPT 1991, Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Vanheyst, E.2
-
9
-
-
84958612917
-
Efficient Group Signature Schemes for Large Groups
-
Advances in Cryptology - CRYPTO '97
-
Camenisch, J. and Stadler, M. (1997) Efficient Group Signature Schemes for Large Groups (Extended Abstract). CRYPTO 97, Lecture Notes in Computer Science 1294, pp. 410-424. Springer. (Pubitemid 127112569)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
10
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Springer
-
Bellare, M., Micciancio, D. and Warinschi, B. (2003) Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. EUROCRYPT 2003, Lecture Notes in Computer Science 2656, pp. 614-629. Springer.
-
(2003)
EUROCRYPT 2003, Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
11
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
Yung M. (ed.), Springer
-
Bresson, E., Stern, J. and Szydlo, M. (2002) Threshold Ring Signatures and Applications to Ad-Hoc Groups. In Yung, M. (ed.), CRYPTO 2002, Lecture Notes in Computer Science 2442, pp. 465-480. Springer.
-
(2002)
CRYPTO 2002, Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
13
-
-
81055144575
-
Forward secure ring signature without random oracles
-
Springer
-
Liu, J.K., Yuen, T.H. and Zhou, J. (2011) Forward Secure Ring Signature without Random Oracles. ICICS, Lecture Notes in Computer Science 7043, pp. 1-14. Springer.
-
(2011)
ICICS, Lecture Notes in Computer Science
, vol.7043
, pp. 1-14
-
-
Liu, J.K.1
Yuen, T.H.2
Zhou, J.3
-
14
-
-
26444587096
-
Perfect concurrent signature schemes
-
Susilo, W., Mu, Y. and Zhang, F. (2004) Perfect Concurrent Signature Schemes. ICICS 2004, Lecture Notes in Computer Science 3269, Malaga, Spain, October 27-29, pp. 14-26. Springer. (Pubitemid 39737126)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3269
, pp. 14-26
-
-
Susilo, W.1
Mu, Y.2
Zhang, F.3
-
15
-
-
35048878760
-
Multi-designated verifiers signatures. ICICS 2004, Malaga, Spain, October
-
Springer
-
Laguillaumie, F. and Vergnaud, D. (2004) Multi-designated Verifiers Signatures. ICICS 2004, Malaga, Spain, October, Lecture Notes in Computer Science 3269, pp. 495-507. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
16
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups (Extended Abstract)
-
Springer
-
Liu, J.K.,Wei,V.K. andWong, D.S. (2004) Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP, Lecture Notes in Computer Science 3108. Springer.
-
(2004)
ACISP, Lecture Notes in Computer Science
, vol.3108
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
18
-
-
24644461219
-
Short linkable ring signatures for E-voting, E-cash and attestation
-
Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
-
Tsang, P.P. andWei,V.K. (2005) Short Linkable Ring Signatures for E-Voting, E-Cash andAttestation. ISPEC 2005, Lecture Notes in Computer Science 3439, pp. 48-60. Springer. (Pubitemid 41273777)
-
(2005)
Lecture Notes in Computer Science
, vol.3439
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
19
-
-
24944589673
-
Linkable ring signatures: Security models and new schemes
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
-
Liu, J.K. and Wong, D.S. (2005) Linkable Ring Signatures: Security Models and New Schemes. ICCSA (2), Lecture Notes in Computer Science 3481, pp. 614-623. Springer. (Pubitemid 41313741)
-
(2005)
Lecture Notes in Computer Science
, vol.3481
, Issue.2
, pp. 614-623
-
-
Liu, J.K.1
Wong, D.S.2
-
20
-
-
33845535348
-
Enhanced security models and a generic construction approach for linkable ring signature
-
DOI 10.1142/S0129054106004480, PII S0129054106004480
-
Liu, J.K. and Wong, D.S. (2006) Enhanced security models and a generic construction approach for linkable ring signature. Int. J. Found. Comput. Sci., 17, 1403-1422. (Pubitemid 44924927)
-
(2006)
International Journal of Foundations of Computer Science
, vol.17
, Issue.6
, pp. 1403-1422
-
-
Liu, J.K.1
Wong, D.S.2
-
21
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Tsang, P.P.,Wei,V.K., Chan, T.K., Au, M.H., Liu, J.K. andWong, D.S. (2004) Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004, Lecture Notes in Computer Science, pp. 384- 398. Springer. (Pubitemid 39748322)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
22
-
-
37149056874
-
Constantsize ID-based linkable and revocable-iff-linked ring signature
-
Springer
-
Au, M.H., Liu, J.K., Susilo,W. andYuen, T.H. (2006) Constantsize ID-based linkable and revocable-iff-linked ring signature. INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pp. 364-378. Springer.
-
(2006)
INDOCRYPT 2006, Lecture Notes in Computer Science
, vol.4329
, pp. 364-378
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
23
-
-
33746190818
-
Short linkable ring signatures revisited
-
Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
-
Au, M.H., Chow, S.S.M., Susilo,W. and Tsang, P.P. (2006) Short Linkable Ring Signatures Revisited. EuroPKI, Lecture Notes in Computer Science 4043, pp. 101-115. Springer. (Pubitemid 44097506)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4043
, pp. 101-115
-
-
Au, M.H.1
Chow, S.S.M.2
Susilo, W.3
Tsang, P.P.4
-
24
-
-
37148998536
-
Certificate based (linkable) ring signature
-
Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings
-
Au, M.H., Liu, J.K., Susilo,W. andYuen, T.H. (2007) Certificate Based (Linkable) Ring Signature. ISPEC 2007, Lecture Notes in Computer Science 4464, pp. 79-92. Springer. (Pubitemid 350259418)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4464
, pp. 79-92
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
25
-
-
38149056458
-
Linkable ring signatures from linear feedback shift register
-
Taipei, Taiwan, December 17-20, Springer
-
Zheng, D., Li, X., Chen, K. and Li, J. (2007) Linkable Ring Signatures from Linear Feedback Shift Register.EUCWorkshops, Lecture Notes in Computer Science 4809, Taipei, Taiwan, December 17-20, pp. 716-727. Springer.
-
(2007)
EUCWorkshops, Lecture Notes in Computer Science
, vol.4809
, pp. 716-727
-
-
Zheng, D.1
Li, X.2
Chen, K.3
Li, J.4
-
26
-
-
78449233611
-
A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity
-
Springer
-
Tsang, P.P.,Au, M.H., Liu, J.K., Susilo,W. andWong, D.S. (2010) A Suite of Non-pairing Id-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. ProvSec 2010, Lecture Notes in Computer Science 6402, pp. 166-183. Springer.
-
(2010)
ProvSec 2010, Lecture Notes in Computer Science
, vol.6402
, pp. 166-183
-
-
Tsang, P.P.1
Au, M.H.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
-
27
-
-
79951793350
-
Sub-linear size traceable ring signatures without random oracles
-
Springer
-
Fujisaki, E. (2011) Sub-linear Size Traceable Ring Signatures without Random Oracles. CT-RSA 2011, Lecture Notes in Computer Science 6558, pp. 393-415. Springer.
-
(2011)
CT-RSA 2011, Lecture Notes in Computer Science
, vol.6558
, pp. 393-415
-
-
Fujisaki, E.1
-
30
-
-
24144433396
-
Evaluating 2- DNF formulas on ciphertexts
-
Springer
-
Boneh, D., Goh, E.-J. and Nissim, K. (2005) Evaluating 2- DNF Formulas on Ciphertexts. TCC, Lecture Notes in Computer Science 3378, pp. 325-341. Springer.
-
(2005)
TCC, Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
32
-
-
38149083391
-
Ring signatures of sub-linear size without random oracles
-
Springer
-
Chandran, N., Groth, J. and Sahai, A. (2007) Ring Signatures of Sub-linear Size without Random Oracles. ICALP 2007, Lecture Notes in Computer Science 4596, pp. 423-434. Springer.
-
(2007)
ICALP 2007, Lecture Notes in Computer Science
, vol.4596
, pp. 423-434
-
-
Chandran, N.1
Groth, J.2
Sahai, A.3
-
33
-
-
33749544769
-
Non-interactive zaps and new techniques for NIZK
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Groth, J., Ostrovsky, R. and Sahai, A. (2006) Non-interactive Zaps and New Techniques for NIZK. CRYPTO, Lecture Notes in Computer Science 4117, pp. 97-111. Springer. (Pubitemid 44532111)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 97-111
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
34
-
-
33746072569
-
Perfect non-interactive zero knowledge for NP
-
DOI 10.1007/11761679-21, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Groth, J., Ostrovsky, R. and Sahai, A. (2006) Perfect Noninteractive Zero Knowledge for NP.EUROCRYPT, Lecture Notes in Computer Science 4004, pp. 339-358. Springer. (Pubitemid 44072249)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 339-358
-
-
Groth, J.1
Ostrovsky, R.2
Sahai, A.3
-
35
-
-
0003605145
-
Constructing digital signatures from a one-way function
-
SRI International Computer Science Laboratory
-
Lamport, L. (1979). Constructing Digital Signatures from a One- Way Function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory.
-
(1979)
Technical Report SRI-CSL-98
-
-
Lamport, L.1
-
36
-
-
84958802026
-
ADigital signature based on a conventional encryption function
-
Springer
-
Merkle, R.C. (1987)ADigital Signature Based on a Conventional Encryption Function. CRYPTO, Lecture Notes in Computer Science 293, pp. 369-378. Springer.
-
(1987)
CRYPTO, Lecture Notes in Computer Science
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
38
-
-
84948125649
-
Optimal Tree-Based One-time Digital Signature Schemes
-
Bleichenbacher,D. and Maurer, U.M. (1996) OptimalTree-Based One-Time Digital Signature Schemes. STACS, Lecture Notes in Computer Science 1046, pp. 363-374. Springer. (Pubitemid 126040190)
-
(1996)
Lecture Notes in Computer Science
, Issue.1046
, pp. 363-374
-
-
Bleichenbacher, D.1
Maurer, U.M.2
-
39
-
-
84955557264
-
On the Efficiency of One-Time Digital Signatures
-
Advances in Cryptology - ASIACRYPT '96
-
Bleichenbacher, D. and Maurer, U.M. (1996) On the Efficiency of One-Time Digital Signatures. ASIACRYPT, Lecture Notes in Computer Science 1163, pp. 145-158. Springer. (Pubitemid 126146221)
-
(1996)
Lecture Notes in Computer Science
, Issue.1163
, pp. 145-158
-
-
Bleichenbacher, D.1
Maurer, U.2
-
41
-
-
84947431932
-
Better than BiBa: Short one-time signatures with fast signing andverifying
-
Springer
-
Reyzin, L. and Reyzin, N. (2002) Better than BiBa: Short One- Time Signatures with Fast Signing andVerifying. ACISP, Lecture Notes in Computer Science 2384, pp. 144-153. Springer.
-
(2002)
ACISP, Lecture Notes in Computer Science
, vol.2384
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
42
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
DOI 10.1007/11681878-4, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Bender, A., Katz, J. and Morselli, R. (2006) Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. TCC, Lecture Notes in Computer Science 3876, pp. 60- 79. Springer. (Pubitemid 43979844)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
43
-
-
79955983400
-
-
ASIACCS 2011, ACM Press
-
Yuen, T.H., Liu, J.K., Au, M.H., Susilo, W. and Zhou, J. (2011) Threshold Ring Signatures Without Random Oracles. ASIACCS 2011, pp. 261-267. ACM Press.
-
(2011)
Threshold Ring Signatures Without Random Oracles
, pp. 261-267
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
44
-
-
24944525692
-
Identity based threshold ring signature
-
Springer, Seoul, Korea. Also available at Cryptology ePrint Archive, Report 2004/179
-
Chow, S.S., Hui, L.C. andYiu, S. (2004) Identity Based Threshold Ring Signature. ICISC 2004, Lecture Notes in Computer Science 3506, pp. 218-232. Springer, Seoul, Korea. Also available at Cryptology ePrint Archive, Report 2004/179.
-
(2004)
ICISC 2004, Lecture Notes in Computer Science
, vol.3506
, pp. 218-232
-
-
Chow, S.S.1
Hui, L.C.2
Yiu, S.3
-
45
-
-
35048889048
-
A separable threshold ring signature scheme
-
Springer
-
Liu, J.K.,Wei,V.K. andWong, D.S. (2003)ASeparable Threshold Ring Signature Scheme. ICISC 2003, Lecture Notes in Computer Science 2971, pp. 352-369. Springer.
-
(2003)
ICISC 2003, Lecture Notes in Computer Science
, vol.2971
, pp. 352-369
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
46
-
-
63149178641
-
Efficient id-based threshold ring signature scheme
-
IEEE Computer Society
-
Han, J., Xu, Q. and Chen, G. (2008) Efficient Id-Based Threshold Ring Signature Scheme. EUC (2), pp. 437-442. IEEE Computer Society.
-
(2008)
EUC
, vol.2
, pp. 437-442
-
-
Han, J.1
Xu, Q.2
Chen, G.3
-
47
-
-
56749180648
-
A new efficient threshold ring signature scheme based on coding theory
-
Springer
-
Melchor, C.A., Cayrel, P.-L. and Gaborit, P. (2008) A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. PQCrypto, Lecture Notes in Computer Science 5299, pp. 1-16. Springer.
-
(2008)
PQCrypto, Lecture Notes in Computer Science
, vol.5299
, pp. 1-16
-
-
Melchor, C.A.1
Cayrel, P.-L.2
Gaborit, P.3
-
48
-
-
72449174214
-
Provably secure code-based threshold ring signatures
-
Cirencester, UK, December 15-17, Springer
-
Dallot, L. andVergnaud, D. (2009) Provably Secure Code-Based Threshold Ring Signatures. IMA Int. Conf., Lecture Notes in Computer Science 5921, Cirencester, UK, December 15-17, pp. 222-235. Springer.
-
(2009)
IMA Int. Conf., Lecture Notes in Computer Science
, vol.5921
, pp. 222-235
-
-
Dallot, L.1
Vergnaud, D.2
-
49
-
-
77955904311
-
A lattice-based threshold ring signature scheme
-
Springer
-
Cayrel, P.-L., Lindner, R., Rückert, M. and Silva, R. (2010) A Lattice-Based Threshold Ring Signature Scheme. LATINCRYPT, Lecture Notes in Computer Science 6212, pp. 255-272. Springer.
-
(2010)
LATINCRYPT, Lecture Notes in Computer Science
, vol.6212
, pp. 255-272
-
-
Cayrel, P.-L.1
Lindner, R.2
Rückert, M.3
Silva, R.4
|