-
1
-
-
35048848152
-
Short signatures without random oracles
-
Springer-Verlag, LNCS 3027
-
D. Boneh and X. Boyen. Short Signatures Without Random Oracles. EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 56-73.
-
EUROCRYPT 2004
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Springer-Verlag, LNCS 3027
-
D. Boneh and X. Boyen. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004, Springer-Verlag, LNCS 3027, pp. 223-238.
-
EUROCRYPT 2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Springer-Verlag, LNCS 2442
-
J. Camenisch, and A. Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 61-76.
-
CRYPTO 2002
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
4
-
-
0242500707
-
A signature scheme with efficient protocols
-
Springer-Verlag, LNCS 2576
-
J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. SCN 2002, Springer-Verlag, LNCS 2576.
-
SCN 2002
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
24944435537
-
Compact E-cash
-
Springer-Verlag, LNCS 3494
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact E-Cash. EUROCRYPT 2005, Springer-Verlag, LNCS 3494, pp. 302-321, 2005.
-
(2005)
EUROCRYPT 2005
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
6
-
-
26444541889
-
A privacy-protecting coupon system
-
Springer-Verlag, LNCS 3570
-
L. Chen, M. Enzmann, A. Sadeghi, M. Schneider, and M. Steiner. A Privacy-Protecting Coupon System. Financial Cryptography 2005, Springer-Verlag, LNCS 3570, pp. 93-109.
-
Financial Cryptography 2005
, pp. 93-109
-
-
Chen, L.1
Enzmann, M.2
Sadeghi, A.3
Schneider, M.4
Steiner, M.5
-
7
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Springer-Verlag, LNCS 3386
-
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. Public Key Cryptography 2005, Springer-Verlag, LNCS 3386, pp. 416-431.
-
Public Key Cryptography 2005
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
8
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer-Verlag, LNCS 263
-
A. Fiat, and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. CRYPTO 1986, Springer-Verlag, LNCS 263, pp. 186-194.
-
CRYPTO 1986
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
24144449163
-
A comparison of CEILIDH and XTR
-
Springer, June
-
R. Granger, D. Page, and M. Stam. A Comparison of CEILIDH and XTR. Algorithmic Number Theory, 6th International Symposium, ANTS-VI, pages 235-249. Springer, June 2004.
-
(2004)
Algorithmic Number Theory, 6th International Symposium, ANTS-VI
, pp. 235-249
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
10
-
-
29244453439
-
Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders
-
A. Kiayias, and Moti Yung. Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. Cryptology ePrint Archive: Report 2004/076.
-
Cryptology EPrint Archive: Report 2004/076
-
-
Kiayias, A.1
Yung, M.2
-
13
-
-
35048839792
-
K-times anonymous authentication
-
Springer-Verlag, LNCS 3329
-
I. Teranisi, J. Furukawa, and K. Sako. k-Times Anonymous Authentication. ASI-ACRYPT 2004, Springer-Verlag, LNCS 3329, pp. 308-322, 2004.
-
(2004)
ASI-ACRYPT 2004
, pp. 308-322
-
-
Teranisi, I.1
Furukawa, J.2
Sako, K.3
-
14
-
-
33745871113
-
K-times anonymous authentication with a constant proving cost
-
Springer-Verlag, LNCS 3958
-
I. Teranishi and K. Sako. k-Times Anonymous Authentication with a Constant Proving Cost. Public Key Cryptography 2006, Springer-Verlag, LNCS 3958, pp. 525-542, 2006.
-
(2006)
Public Key Cryptography 2006
, pp. 525-542
-
-
Teranishi, I.1
Sako, K.2
-
15
-
-
33646002029
-
Tracing-by-linking group signatures
-
Springer-Verlag, LNCS 3650
-
V. Wei. Tracing-by-Linking Group Signatures. Information Security Conference (ISC) 2005, Springer-Verlag, LNCS 3650, pp. 149-163, 2005.
-
(2005)
Information Security Conference (ISC) 2005
, pp. 149-163
-
-
Wei, V.1
|