-
1
-
-
33646840349
-
On the minimal assumptions of group signature schemes
-
López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. Springer, Heidelberg
-
Abdalla, M., Warinschi, B.: On the Minimal Assumptions of Group Signature Schemes. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 1-13. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3269
, pp. 1-13
-
-
Abdalla, M.1
Warinschi, B.2
-
2
-
-
77956996315
-
Structure- preserving signatures and commitments to group elements
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure- Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209-236. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
3
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of kurosawa-Desmedt KEM
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
4
-
-
77956998660
-
Signing on elements in bilinear groups for modular protocol design
-
Abe, M., Haralambiev, K., Ohkubo, M.: Signing on elements in bilinear groups for modular protocol design. Cryptology ePrint Archive, Report 2010/133 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology EPrint Archive, Report 2010/133
-
-
Abe, M.1
Haralambiev, K.2
Ohkubo, M.3
-
5
-
-
36549001029
-
Practical group signatures without random oracles
-
Ateniese, G., Camenisch, J., Hohenberger, S., de Medeiros, B.: Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005/385 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology EPrint Archive, Report 2005/385
-
-
Ateniese, G.1
Camenisch, J.2
Hohenberger, S.3
De Medeiros, B.4
-
6
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Ateniese, G., Camenisch, J.L., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.L.2
Joye, M.3
Tsudik, G.4
-
7
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
8
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
-
Bellare, M., Shi, H., Zhang, C.: Foundations of Group Signatures: The Case of Dynamic Groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136-153. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
9
-
-
45749116570
-
Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures
-
Bellare, M., Shoup, S.: Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures. IET Information Security 2(2), 47-63 (2008)
-
(2008)
IET Information Security
, vol.2
, Issue.2
, pp. 47-63
-
-
Bellare, M.1
Shoup, S.2
-
10
-
-
77958065231
-
Get shorty via group signatures without encryption
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Bichsel, P., Camenisch, J., Neven, G., Smart, N.P., Warinschi, B.: Get Shorty via Group Signatures without Encryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 381-398. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 381-398
-
-
Bichsel, P.1
Camenisch, J.2
Neven, G.3
Smart, N.P.4
Warinschi, B.5
-
11
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
12
-
-
57949110320
-
On the impossibility of basing identity based encryption on trapdoor permutations
-
Boneh, D., Papakonstantinou, P.A., Rackoff, C., Vahlis, Y., Waters, B.: On the impossibility of basing identity based encryption on trapdoor permutations. In: 49th Annual IEEE Symposium on Foundations of Computer Science, pp. 283-292 (2008)
-
(2008)
49th Annual IEEE Symposium on Foundations of Computer Science
, pp. 283-292
-
-
Boneh, D.1
Papakonstantinou, P.A.2
Rackoff, C.3
Vahlis, Y.4
Waters, B.5
-
14
-
-
33746042155
-
Compact group signatures without random oracles
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Boyen, X., Waters, B.: Compact Group Signatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 427-444. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
15
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Boyen, X., Waters, B.: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 1-15. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
16
-
-
84869520399
-
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
-
Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. Cryptology ePrint Archive, Report 2008/375 (2008), http://eprint.iacr. org/
-
(2008)
Cryptology EPrint Archive, Report 2008/375
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
17
-
-
67650691588
-
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Camenisch, J., Chandran, N., Shoup, V.: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 351-368. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 351-368
-
-
Camenisch, J.1
Chandran, N.2
Shoup, V.3
-
18
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
84921060028
-
Separability and efficiency for generic group signature schemes (extended abstract)
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Camenisch, J., Michels, M.: Separability and Efficiency for Generic Group Signature Schemes (Extended Abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 413-785. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 413-785
-
-
Camenisch, J.1
Michels, M.2
-
20
-
-
85024290278
-
Group signatures
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
21
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
22
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
23
-
-
84887276320
-
Dynamic fully anonymous short group signatures
-
Nguyên, P.Q. (ed.) VIETCRYPT 2006. Springer, Heidelberg
-
Delerablée, C., Pointcheval, D.: Dynamic Fully Anonymous Short Group Signatures. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 193-210. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 193-210
-
-
Delerablée, C.1
Pointcheval, D.2
-
24
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
25
-
-
26444446884
-
An efficient group signature scheme from bilinear maps
-
Boyd, C., Nieto, J.G. (eds.) ACISP 2005. Springer, Heidelberg
-
Furukawa, J., Imai, H.: An Efficient Group Signature Scheme from Bilinear Maps. In: Boyd, C., Nieto, J.G. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 455-467. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3574
, pp. 455-467
-
-
Furukawa, J.1
Imai, H.2
-
26
-
-
79955538557
-
Groth-sahai proofs revisited
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Ghadafi, E., Smart, N.P.,Warinschi, B.: Groth-Sahai Proofs Revisited. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 177-192. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 177-192
-
-
Ghadafi, E.1
Smart, N.P.2
Warinschi, B.3
-
27
-
-
77649262306
-
Simulation-sound NIZK proofs for a practical language and constant size group signatures
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 444-459
-
-
Groth, J.1
-
28
-
-
38149097733
-
Fully anonymous group signatureswithout random oracles
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Groth, J.: Fully Anonymous Group SignaturesWithout Random Oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164-180. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 164-180
-
-
Groth, J.1
-
29
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
30
-
-
32244433334
-
κ-resilient identity-based encryption in the standard model
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Heng, S.-H., Kurosawa, K.: κ-Resilient Identity-Based Encryption in the Standard Model. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 67-80. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 67-80
-
-
Heng, S.-H.1
Kurosawa, K.2
-
31
-
-
35048841283
-
Traceable signatures
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Kiayias, A., Tsiounis, Y., Yung, M.: Traceable Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571-589. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
32
-
-
29244453439
-
Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders
-
Kiayias, A., Yung, M.: Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076 (2004), http://eprint.iacr.org/
-
(2004)
Cryptology EPrint Archive, Report 2004/076
-
-
Kiayias, A.1
Yung, M.2
-
33
-
-
24944524118
-
Group signatures with efficient concurrent join
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Kiayias, A., Yung, M.: Group Signatures with Efficient Concurrent Join. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 198-214. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
34
-
-
84957649548
-
Identity escrow
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169-185. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
35
-
-
33745574075
-
Chosen-ciphertext security from tag-based encryption
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 581-600
-
-
Kiltz, E.1
-
36
-
-
30744458170
-
Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract)
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
MacKenzie, P.D., Reiter, M.K., Yang, K.: Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 171-190. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 171-190
-
-
Mackenzie, P.D.1
Reiter, M.K.2
Yang, K.3
-
37
-
-
70350666379
-
On the theoretical gap between group signatures with and without unlinkability
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Ohtake, G., Fujii, A., Hanaoka, G., Ogawa, K.: On the Theoretical Gap between Group Signatures with and without Unlinkability. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 149-166. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 149-166
-
-
Ohtake, G.1
Fujii, A.2
Hanaoka, G.3
Ogawa, K.4
-
38
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
39
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
-
IEEE Computer Society
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553. IEEE Computer Society (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 543-553
-
-
Sahai, A.1
-
41
-
-
38049124394
-
A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/
-
(2007)
Cryptology EPrint Archive, Report 2007/074
-
-
Shacham, H.1
-
42
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
|