-
1
-
-
84870825011
-
A practical and secure coercion-resistant scheme for remote elections
-
July
-
Araujo, R., Foulle, S., Traoré, J.: A practical and secure coercion-resistant scheme for remote elections. In: Frontiers of Electronic Voting, Schloss Dagstuhl, Germany. Dagstuhl Seminar Proceedings, vol. 7311 (July 2007)
-
(2007)
Frontiers of Electronic Voting, Schloss Dagstuhl, Germany. Dagstuhl Seminar Proceedings
, vol.7311
-
-
Araujo, R.1
Foulle, S.2
Traoré, J.3
-
2
-
-
84865584730
-
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
-
Au, M.H., Tsang, P.P., Kapadia, A.: PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security 14(4), Article No. 29 (2011)
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.4
, pp. 29
-
-
Au, M.H.1
Tsang, P.P.2
Kapadia, A.3
-
3
-
-
85168123147
-
BLACR: TTP-free blacklistable anonymous credentials with reputation
-
Au, M.H., Kapadia, A., Susilo, W.: BLACR: TTP-free blacklistable anonymous credentials with reputation. In: Proceedings of NDSS 2012, San Diego, CA, USA (February 2012)
-
Proceedings of NDSS 2012, San Diego, CA, USA (February 2012)
-
-
Au, M.H.1
Kapadia, A.2
Susilo, W.3
-
4
-
-
84949201764
-
Batch Verification with Applications to Cryptography and Checking
-
Bellare, M., Garay, J.A., Rabin, T.: Batch verification with applications to cryptography and checking. In: Lucchesi, C.L., Moura, A.V. (eds.) LATIN 1998. LNCS, vol. 1380, pp. 170-191. Springer, Heidelberg (1998) (Pubitemid 128056276)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1380
, pp. 170-191
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
5
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Advances in Cryptology - EUROCRYPT '98
-
Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236-250. Springer, Heidelberg (1998) (Pubitemid 128081489)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
6
-
-
84983104598
-
On defining proofs of knowledge
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
7
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology 21(2), 149-177 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
38149094079
-
A practical system for globally revoking the unlinkable pseudonyms of unknown users
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
-
Brands, S., Demuynck, L., De Decker, B.: A practical system for globally revoking the unlinkable pseudonyms of unknown users. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 400-415. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4586
, pp. 400-415
-
-
Brands, S.1
Demuynck, L.2
De Decker, B.3
-
9
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
November
-
Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proceedings of CCS 1999, Singapore, pp. 120-127 (November 1999)
-
(1999)
Proceedings of CCS 1999, Singapore
, pp. 120-127
-
-
Cachin, C.1
-
10
-
-
44449163404
-
Zero-knowledge sets with short proofs
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Catalano, D., Fiore, D., Messina, M.: Zero-knowledge sets with short proofs. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 433-450. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 433-450
-
-
Catalano, D.1
Fiore, D.2
Messina, M.3
-
11
-
-
84857095595
-
Selections: Internet voting with over-the-shoulder coercion-resistance
-
Danezis, G. (ed.) FC 2011. Springer, Heidelberg
-
Clark, J., Hengartner, U.: Selections: Internet voting with over-the-shoulder coercion-resistance. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 47-61. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7035
, pp. 47-61
-
-
Clark, J.1
Hengartner, U.2
-
12
-
-
85016672373
-
Proof of partial knowledge and simplified design of witness hiding protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
78651316829
-
Faster integer multiplication
-
Fürer, M.: Faster integer multiplication. SIAM Journal on Computing 39(3), 979-1005 (2009)
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.3
, pp. 979-1005
-
-
Fürer, M.1
-
15
-
-
35048891568
-
Batching Schnorr identification scheme with applications to privacy-preserving authorization and low-bandwidth communication devices
-
Gennaro, R., Leigh, D., Sundaram, R., Yerazunis, W.S.: Batching schnorr identification scheme with applications to privacy-preserving authorization and lowbandwidth communication devices. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 276-292. Springer, Heidelberg (2004) (Pubitemid 39747760)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 276-292
-
-
Gennaro, R.1
Leigh, D.2
Sundaram, R.3
Yerazunis, W.4
-
16
-
-
34548787882
-
Improving the robustness of private information retrieval
-
May
-
Goldberg, I.: Improving the robustness of private information retrieval. In: Proceedings of IEEE S&P 2007, Oakland, CA, USA, pp. 131-148 (May 2007)
-
(2007)
Proceedings of IEEE S&P 2007, Oakland, CA, USA
, pp. 131-148
-
-
Goldberg, I.1
-
17
-
-
0025430107
-
A note on computational indistinguishability
-
Goldreich, O.: A note on computational indistinguishability. Information Processing Letters 34(6), 277-281 (1990)
-
(1990)
Information Processing Letters
, vol.34
, Issue.6
, pp. 277-281
-
-
Goldreich, O.1
-
18
-
-
71149116146
-
Proofs that yield nothing but their validity or languages in NP have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or languages in NP have zero-knowledge proof systems. Journal of the ACM 38(3), 691-729 (1991)
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
0031643581
-
Honest-verifier statistical zero-knowledge equals general statistical zero-knowledge
-
Goldreich, O., Sahai, A., Vadhan, S.P.: Honest-verifier statistical zero-knowledge equals general statistical zero-knowledge. In: Proceedings of STOC 1998, Dallas, TX, USA, pp. 399-408 (1998)
-
(1998)
Proceedings of STOC 1998, Dallas, TX, USA
, pp. 399-408
-
-
Goldreich, O.1
Sahai, A.2
Vadhan, S.P.3
-
20
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
extended abstract May
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems (extended abstract). In: Proceedings of STOC 1985, Providence, RI, USA, pp. 291-304 (May 1985)
-
(1985)
Proceedings of STOC 1985, Providence, RI, USA
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
77956731303
-
A verifiable secret shuffle of homomorphic encryptions
-
Groth, J.: A verifiable secret shuffle of homomorphic encryptions. Journal of Cryptology 23(4), 546-579 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.4
, pp. 546-579
-
-
Groth, J.1
-
22
-
-
84879868407
-
All-but-k mercurial commitments and their applications
-
University of Waterloo, Waterloo, ON, Canada November
-
Henry, R., Goldberg, I.: All-but-k mercurial commitments and their applications. Technical Report CACR 2012-26, University of Waterloo, Waterloo, ON, Canada (November 2012)
-
(2012)
Technical Report CACR 2012-26
-
-
Henry, R.1
Goldberg, I.2
-
23
-
-
84879846444
-
Batch proofs of partial knowledge
-
University of Waterloo, Waterloo, ON, Canada February
-
Henry, R., Goldberg, I.: Batch proofs of partial knowledge. Technical Report CACR 2013-08, University of Waterloo, Waterloo, ON, Canada (February 2013)
-
(2013)
Technical Report CACR 2013-08
-
-
Henry, R.1
Goldberg, I.2
-
24
-
-
80755143984
-
Practical PIR for electronic commerce
-
October
-
Henry, R., Olumofin, F.G., Goldberg, I.: Practical PIR for electronic commerce. In: Proceedings of CCS 2011, Chicago, IL, USA, pp. 677-690 (October 2011)
-
(2011)
Proceedings of CCS 2011, Chicago, IL, USA
, pp. 677-690
-
-
Henry, R.1
Olumofin, F.G.2
Goldberg, I.3
-
25
-
-
33749009810
-
Coercion-resistant electronic elections
-
November
-
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of WPES 2005, Alexandria, VA, USA, pp. 61-70 (November 2005)
-
(2005)
Proceedings of WPES 2005, Alexandria, VA, USA
, pp. 61-70
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
26
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
27
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 261(4), 515-534 (1982)
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
28
-
-
67650119018
-
Batch ZK proof and verification of OR logic
-
Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. Springer, Heidelberg
-
Peng, K., Bao, F.: Batch ZK proof and verification of OR logic. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 141-156. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5487
, pp. 141-156
-
-
Peng, K.1
Bao, F.2
-
29
-
-
77953509172
-
Batch range proof for practical small ranges
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Peng, K., Bao, F.: Batch range proof for practical small ranges. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 114-130. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 114-130
-
-
Peng, K.1
Bao, F.2
-
30
-
-
34249734850
-
Batch zero-knowledge proof and verification and its applications
-
Peng, K., Boyd, C., Dawson, E.: Batch zero-knowledge proof and verification and its applications. ACM Transactions on Information and System Security 10(2), Article No. 6 (2007)
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.2
, pp. 6
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
-
31
-
-
0001574460
-
Receipt-free mix-type voting scheme
-
Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
-
Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393-403. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
32
-
-
84857090418
-
A new approach towards coercion-resistant remote e-voting in linear time
-
Danezis, G. (ed.) FC 2011. Springer, Heidelberg
-
Spycher, O., Koenig, R.E., Haenni, R., Schläpfer, M.: A new approach towards coercion-resistant remote e-voting in linear time. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 182-189. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7035
, pp. 182-189
-
-
Spycher, O.1
Koenig, R.E.2
Haenni, R.3
Schläpfer, M.4
-
33
-
-
78651408573
-
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Transactions on Information and Systems Security 13(4), Article No. 39 (2010)
-
(2010)
ACM Transactions on Information and Systems Security
, vol.13
, Issue.4
, pp. 39
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
34
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable linkable threshold ring signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 384-398. Springer, Heidelberg (2004) (Pubitemid 39748322)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
35
-
-
34548150987
-
On coercion-resistant electronic elections with linear work
-
April
-
Weber, S.G., Araujo, R., Buchmann, J.: On coercion-resistant electronic elections with linear work. In: Proceedings of ARES 2007, Vienna, Austria, pp. 908-916 (April 2007)
-
(2007)
Proceedings of ARES 2007, Vienna, Austria
, pp. 908-916
-
-
Weber, S.G.1
Araujo, R.2
Buchmann, J.3
|