-
1
-
-
79959315979
-
Double-Trapdoor Anonymous Tags for Traceable Signatures
-
LNCS 6715, Springer, Berlin
-
Abe, M., Chow, S. S. M., Haralambiev, K., Ohkubo, M.: Double-Trapdoor Anonymous Tags for Traceable Signatures. Applied Cryptography and Network Security-ACNS 2011, LNCS 6715, pp. 183-200. Springer, Berlin (2011).
-
(2011)
Applied Cryptography and Network Security-ACNS 2011
, pp. 183-200
-
-
Abe, M.1
Chow, S.S.M.2
Haralambiev, K.3
Ohkubo, M.4
-
2
-
-
36549001029
-
-
Cryptology ePrint Archive. Report 2005/385, available at
-
Ateniese, G., Camenisch, J., Hohenberger, S., de Medeiros, B.: Practical Group Signatures Without Random Oracles. Cryptology ePrint Archive. Report 2005/385, available at http://eprint. iacr. org/2005/385.
-
Practical Group Signatures Without Random Oracles
-
-
Ateniese, G.1
Camenisch, J.2
Hohenberger, S.3
de Medeiros, B.4
-
3
-
-
33745797863
-
Untraceable RFID Tags Via Insubvertible Encryption
-
ACM Press, New york
-
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID Tags Via Insubvertible Encryption. Computer and Communications Security-CCS 2005, pp. 92-101. ACM Press, New york (2005).
-
(2005)
Computer and Communications Security-CCS 2005
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
de Medeiros, B.3
-
4
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press, New york
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. Computer and Communications Security-CCS 2004, pp. 132-145. ACM Press, New york (2004).
-
(2004)
Computer and Communications Security-CCS 2004
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
5
-
-
52149103884
-
A New Direct Anonymous Attestation Scheme from Bilinear Maps
-
LNCS 4968, Springer, Berlin
-
Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. Trusted Computing-Challenges and Applications-TRUST 2008, LNCS 4968, pp. 166-178. Springer, Berlin (2008).
-
(2011)
Trusted Computing-Challenges and Applications-TRUST 2008
, pp. 166-178
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
6
-
-
70349608477
-
Simplified security notions for direct anonymous attestation and a concrete scheme from pairings
-
Brickell, E., Chen, L., Li, J.: Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Secur. 8, 315-330 (2009).
-
(2009)
Int. J. Inf. Secur.
, vol.8
, pp. 315-330
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
7
-
-
56649119348
-
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
-
ACM Press, New york
-
Brickell, E., Li, J.: Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. Privacy in the Electronic Society-WPES 2007, pp. 21-30. ACM Press, New york (2007).
-
(2007)
Privacy in the Electronic Society-WPES 2007
, pp. 21-30
-
-
Brickell, E.1
Li, J.2
-
9
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297-319 (2004).
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
35248843604
-
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
-
LNCS 2656, Springer, Berlin
-
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Advances in Cryptology-Eurocrypt 2003, LNCS 2656, pp. 614-629. Springer, Berlin (2003).
-
(2003)
Advances in Cryptology-Eurocrypt 2003
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
12
-
-
24144477851
-
Foundations of Group Signatures: The Case of Dynamic Groups
-
LNCS 3376, Springer, Berlin
-
Bellare, M., Shi, H., Zhang, C.: Foundations of Group Signatures: The Case of Dynamic Groups. Topics in Cryptology-CT-RSA 2005, LNCS 3376, pp. 136-153. Springer, Berlin (2005).
-
(2005)
Topics in Cryptology-CT-RSA 2005
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
13
-
-
35048845114
-
Signature Schemes and Anonymous Credentials from Bilinear Maps
-
LNCS 3152, Springer, Berlin
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. Advances in Cryptology-CRYPTO 2004, LNCS 3152, pp. 56-72. Springer, Berlin (2004).
-
(2004)
Advances in Cryptology-CRYPTO 2004
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
33749578123
-
On Signatures of Knowledge
-
LNCS 4117, Springer, Berlin
-
Chase, M., Lysyanskaya, A.: On Signatures of Knowledge. Advances in Cryptology-CRYPTO 2006, LNCS 4117, pp. 78-96. Springer, Berlin (2006).
-
(2006)
Advances in Cryptology-CRYPTO 2006
, pp. 78-96
-
-
Chase, M.1
Lysyanskaya, A.2
-
17
-
-
72849152401
-
Direct anonymous attestation for next generation TPM
-
Chen, X., Feng, D.: Direct anonymous attestation for next generation TPM. J. Comput. 3, 43-50 (2008).
-
(2008)
J. Comput.
, vol.3
, pp. 43-50
-
-
Chen, X.1
Feng, D.2
-
19
-
-
70349597967
-
-
Provable Security-ProvSec 2008, LNCS 5324, Springer, Berlin
-
Chen, L., Morrissey, P., Smart, N. P.: On proofs of Security of DAA Schemes. Provable Security-ProvSec 2008, LNCS 5324, pp. 167-175. Springer, Berlin (2008).
-
(2008)
On proofs of Security of DAA Schemes
, pp. 167-175
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
20
-
-
52149086372
-
Pairings in Trusted Computing
-
LNCS 5209, Springer, Berlin
-
Chen, L., Morrissey, P., Smart, N. P.: Pairings in Trusted Computing. Pairings in Cryptography-Pairing 2008, LNCS 5209, pp. 1-17. Springer, Berlin (2008).
-
(2008)
Pairings in Cryptography-Pairing 2008
, pp. 1-17
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
21
-
-
77952991405
-
-
Cryptology ePrint Archive. Report 2009/198, available at
-
Chen, L., Morrissey, P., Smart, N. P.: DAA: Fixing the Pairing Based Protocols. Cryptology ePrint Archive. Report 2009/198, available at http://eprint. iacr. org/2009/198.
-
DAA: Fixing the Pairing Based Protocols
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
22
-
-
77954741944
-
On the Design and Implementation of an Efficient DAA Scheme
-
LNCS 6035, Springer, Berlin
-
Chen, L., Page, D., Smart, N. P.: On the Design and Implementation of an Efficient DAA Scheme. Smart Card Research and Advanced Application-CARDIS 2010, LNCS 6035, pp. 223-237. Springer, Berlin (2010).
-
(2010)
Smart Card Research and Advanced Application-CARDIS 2010
, pp. 223-237
-
-
Chen, L.1
Page, D.2
Smart, N.P.3
-
24
-
-
70549093018
-
Real Traceable Signatures
-
LNCS 5867, Springer, Berlin
-
Chow, S. S. M.: Real Traceable Signatures. Selected Areas in Cryptography-SAC 2009, LNCS 5867, pp. 92-107. Springer, Berlin (2009).
-
(2009)
Selected Areas in Cryptography-SAC 2009
, pp. 92-107
-
-
Chow, S.S.M.1
-
25
-
-
33745534937
-
Games and the Impossibility of Realizable Ideal Functionality
-
LNCS 3876, Springer, Berlin
-
Datta, A., Derek, A., Mitchell, J. C., Ramanathan, A., Scedrov, A.: Games and the Impossibility of Realizable Ideal Functionality. Theory of Cryptography Conference-TCC 2006, LNCS 3876, pp. 360-379. Springer, Berlin (2006).
-
(2006)
Theory of Cryptography Conference-TCC 2006
, pp. 360-379
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Ramanathan, A.4
Scedrov, A.5
-
26
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
LNCS 263, Springer, Berlin
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Advances in Cryptology-CRYPTO 1986, LNCS 263, pp. 186-194. Springer, Berlin (1986).
-
(1986)
Advances in Cryptology-CRYPTO 1986
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
27
-
-
53249117524
-
Pairings for cryptographers
-
Galbraith, S., Paterson, K., Smart, N. P.: Pairings for cryptographers. Discret. Appl. Math. 156, 3113-3121 (2008).
-
(2008)
Discret. Appl. Math.
, vol.156
, pp. 3113-3121
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.P.3
-
28
-
-
84866990030
-
Efficient Two-Move Blind Signatures in the Common Reference String Model
-
LNCS 7483, Springer, Berlin
-
Ghadafi, E., Smart, N. P.: Efficient Two-Move Blind Signatures in the Common Reference String Model. Infosrmation Security-ISC 2012, LNCS 7483, pp. 274-289. Springer, Berlin (2012).
-
(1986)
Information Security-ISC 2012
, pp. 274-289
-
-
Ghadafi, E.1
Smart, N.P.2
-
29
-
-
58349109585
-
Universally Composable Adaptive Oblivious Transfer
-
LNCS 5350, Springer, Berlin
-
Green, M., Hohenberger, S.: Universally Composable Adaptive Oblivious Transfer. Advances in Cryptology-ASIACRYPT 2008, LNCS 5350, pp. 179-197. Springer, Berlin (2008).
-
(2008)
Advances in Cryptology-ASIACRYPT 2008
, pp. 179-197
-
-
Green, M.1
Hohenberger, S.2
-
30
-
-
38149097733
-
Fully Anonymous Group Signatures Without Random Oracles
-
LNCS 4833, Springer, Berlin
-
Groth, J.: Fully Anonymous Group Signatures Without Random Oracles. Advances in Cryptology-ASIACRYPT 2007, LNCS 4833, pp. 164-180. Springer, Berlin (2007).
-
(2007)
Advances in Cryptology-ASIACRYPT 2007
, pp. 164-180
-
-
Groth, J.1
-
31
-
-
84958591696
-
Security of Blind Digital Signatures
-
LNCS 1294, Springer, Berlin
-
Juels, A., Luby, M., Ostrovsky, R.: Security of Blind Digital Signatures. Advances in Cryptology-CRYPTO '97, LNCS 1294, pp. 150-164. Springer, Berlin (1997).
-
(1997)
Advances in Cryptology-CRYPTO '97
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
32
-
-
35048825874
-
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
-
LNCS 3108, Springer, Berlin
-
Liu, J. K., Wei, V. K., Wong, D. S.: Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. Information Security and Privacy-ACISP 2004, LNCS 3108, pp. 325-335. Springer, Berlin (2004).
-
(2004)
Information Security and Privacy-ACISP 2004
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
33
-
-
67651053584
-
Pseudonym Systems
-
LNCS 1758, Springer, Berlin
-
Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. Selected Areas in Cryptography-SAC 99, LNCS 1758, pp. 184-199. Springer, Berlin (1999).
-
(1999)
Selected Areas in Cryptography-SAC 99
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
34
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361-396 (2000).
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
35
-
-
77952377083
-
Blacklistable Anonymous Credentials: Blocking Misbehaving Users without ttps
-
ACM Press, New york
-
Tsang, P. P., Au, M. H., Kapadia, A., Smith, S. W.: Blacklistable Anonymous Credentials: Blocking Misbehaving Users without ttps. Computer and Communications Security-CCS 2007, pp. 72-81. ACM Press, New york (2007).
-
(2007)
Computer and Communications Security-CCS 2007
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
36
-
-
84877601614
-
-
Trusted Computing Group (TCG): TPM Specification 1. 2. Available at
-
Trusted Computing Group (TCG): TPM Specification 1. 2. Available at http://www. trustedcomputinggroup. org (2003).
-
(2003)
-
-
|