-
1
-
-
84869474722
-
PERM: Practical reputation-based blacklisting without TTPs
-
Raleigh, NC, USA, October
-
M. H. Au and A. Kapadia. PERM: Practical reputation-based blacklisting without TTPs. In Proceedings of CCS 2012, pages 929-940, Raleigh, NC, USA, October 2012.
-
(2012)
Proceedings of CCS 2012
, pp. 929-940
-
-
Au, M.H.1
Kapadia, A.2
-
2
-
-
85168123147
-
BLACR: TTP-free blacklistable anonymous credentials with reputation
-
M. H. Au, A. Kapadia, and W. Susilo. BLACR: TTP-free blacklistable anonymous credentials with reputation. In Proceedings of NDSS 2012, San Diego, CA, USA, February 2012.
-
Proceedings of NDSS 2012, San Diego, CA, USA, February 2012
-
-
Au, M.H.1
Kapadia, A.2
Susilo, W.3
-
3
-
-
33749993205
-
Constant-size dynamic k-TAA
-
Proceedings of SCN 2006, Maiori, Italy, September
-
M. H. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-TAA. In Proceedings of SCN 2006, volume 4116 of LNCS, pages 111-125, Maiori, Italy, September 2006.
-
(2006)
LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
4
-
-
84865584730
-
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
-
December
-
M. H. Au, P. P. Tsang, and A. Kapadia. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security, 14(4):29, December 2011.
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.4
, pp. 29
-
-
Au, M.H.1
Tsang, P.P.2
Kapadia, A.3
-
5
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Proceedings of EUROCRYPT 1998, Espoo, Finland, June
-
M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Proceedings of EUROCRYPT 1998, volume 1403 of LNCS, pages 236-250, Espoo, Finland, June 1998.
-
(1998)
LNCS
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
6
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
April
-
D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2):149-177, April 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
0000742754
-
Addition chain heuristics
-
Proceedings of CRYPTO 1989, Santa Barbara, CA, USA, August
-
J. N. Bos and M. J. Coster. Addition chain heuristics. In Proceedings of CRYPTO 1989, volume 435 of LNCS, pages 400-407, Santa Barbara, CA, USA, August 1989.
-
(1989)
LNCS
, vol.435
, pp. 400-407
-
-
Bos, J.N.1
Coster, M.J.2
-
8
-
-
84863345554
-
Enhanced Privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
May
-
E. Brickell and J. Li. Enhanced Privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. IEEE Transactions on Dependable and Secure Computing (TDSC), 9(3):345-360, May 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.9
, Issue.3
, pp. 345-360
-
-
Brickell, E.1
Li, J.2
-
9
-
-
85027967075
-
Fast exponentiation with precomputation
-
extended abstract. Proceedings of EUROCRYPT 1992, Balatonfüred, Hungary, May
-
E. F. Brickell, D. M. Gordon, K. S. McCurley, and D. B. Wilson. Fast exponentiation with precomputation (extended abstract). In Proceedings of EUROCRYPT 1992, volume 658 of LNCS, pages 200-207, Balatonfüred, Hungary, May 1992.
-
(1992)
LNCS
, vol.658
, pp. 200-207
-
-
Brickell, E.F.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.B.4
-
10
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Proceedings of CRYPTO 2003, Santa Barbara, CA, USA, August
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Proceedings of CRYPTO 2003, volume 2729 of LNCS, pages 126-144, Santa Barbara, CA, USA, August 2003.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
11
-
-
84958612917
-
Efficient group signature schemes for large groups
-
extended abstract. Proceedings of CRYPTO 1997, Santa Barbara, CA, USA, August
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In Proceedings of CRYPTO 1997, volume 1294 of LNCS, pages 410-424, Santa Barbara, CA, USA, August 1997.
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
12
-
-
84862489679
-
Wallet databases with observers
-
Proceedings of CRYPTO 1992, Santa Barbara, CA, USA, August
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In Proceedings of CRYPTO 1992, volume 740 of LNCS, pages 89-105, Santa Barbara, CA, USA, August 1992.
-
(1992)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
13
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Proceedings of CRYPTO 1994, Santa Barbara, CA, USA, August
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proceedings of CRYPTO 1994, volume 839 of LNCS, pages 174-187, Santa Barbara, CA, USA, August 1994.
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
14
-
-
84864794192
-
-
Technical report, Aarhus Universitet, March 2011. CPT Available from
-
I. Damgård. On Σ-protocols. Technical report, Aarhus Universitet, March 2011. CPT 2011; Available from http://www.daimi.au.dk/~ivan/ Sigma.pdf.
-
(2011)
On Σ-Protocols
-
-
Damgård, I.1
-
15
-
-
84947273682
-
The Sybil attack
-
Proceedings of IPTPS 2002, Cambridge, MA, USA, March
-
J. R. Douceur. The Sybil attack. In Proceedings of IPTPS 2002, volume 2429 of LNCS, pages 251-260, Cambridge, MA, USA, March 2002.
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
16
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Proceedings of CRYPTO 1986, Santa Barbara, CA, USA, August
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of CRYPTO 1986, volume 263 of LNCS, pages 186-194, Santa Barbara, CA, USA, August 1986.
-
(1986)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
80051954287
-
Formalizing anonymous blacklisting systems
-
Berkeley, CA, USA, May
-
R. Henry and I. Goldberg. Formalizing anonymous blacklisting systems. In Proceedings of IEEE S&P 2011, pages 81-95, Berkeley, CA, USA, May 2011.
-
(2011)
Proceedings of IEEE S&P 2011
, pp. 81-95
-
-
Henry, R.1
Goldberg, I.2
-
18
-
-
84879868407
-
-
Technical Report CACR 2012-26, University of Waterloo, Waterloo, ON, Canada, December Available from
-
R. Henry and I. Goldberg. All-but-k mercurial commitments and their applications. Technical Report CACR 2012-26, University of Waterloo, Waterloo, ON, Canada, December 2012. Available from http://cacr.uwaterloo.ca/techreports/ 2012/cacr2012-26.pdf.
-
(2012)
All-but-k Mercurial Commitments and Their Applications
-
-
Henry, R.1
Goldberg, I.2
-
19
-
-
84879855087
-
Batch proofs of partial knowledge
-
Proceedings of ACNS 2012, Banff, AB, Canada, June
-
R. Henry and I. Goldberg. Batch proofs of partial knowledge. In Proceedings of ACNS 2012, volume 7954 of LNCS, pages 502-517, Banff, AB, Canada, June 2013.
-
(2013)
LNCS
, vol.7954
, pp. 502-517
-
-
Henry, R.1
Goldberg, I.2
-
20
-
-
84889048529
-
-
extended version. Technical Report CACR 2013-26, University of Waterloo, Waterloo, ON, Canada, August Available from
-
R. Henry and I. Goldberg. Thinking inside the BLAC box: Smarter protocols for faster anonymous blacklisting (extended version). Technical Report CACR 2013-26, University of Waterloo, Waterloo, ON, Canada, August 2013. Available from http://cacr.uwaterloo.ca/techreports/2013/cacr2013-26.pdf.
-
(2013)
Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting
-
-
Henry, R.1
Goldberg, I.2
-
21
-
-
77955455561
-
Making a Nymbler Nymble using VERBS
-
Proceedings of PETS 2010, Berlin, Germany, July
-
R. Henry, K. Henry, and I. Goldberg. Making a Nymbler Nymble using VERBS. In Proceedings of PETS 2010, volume 6205 of LNCS, pages 111-129, Berlin, Germany, July 2010.
-
(2010)
LNCS
, vol.6205
, pp. 111-129
-
-
Henry, R.1
Henry, K.2
Goldberg, I.3
-
22
-
-
70350337337
-
How to hash into elliptic curves
-
Proceedings of CRYPTO 2009, Santa Barbara, CA, USA, August
-
T. Icart. How to hash into elliptic curves. In Proceedings of CRYPTO 2009, volume 5677 of LNCS, pages 303-316, Santa Barbara, CA, USA, August 2009.
-
(2009)
LNCS
, vol.5677
, pp. 303-316
-
-
Icart, T.1
-
23
-
-
38149012971
-
Nymble: Anonymous IP-address blocking
-
Proceedings of PETS 2007, Ottawa, ON, Canada, June
-
P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-address blocking. In Proceedings of PETS 2007, volume 4776 of LNCS, pages 113-133, Ottawa, ON, Canada, June 2007.
-
(2007)
LNCS
, vol.4776
, pp. 113-133
-
-
Johnson, P.C.1
Kapadia, A.2
Tsang, P.P.3
Smith, S.W.4
-
25
-
-
84955368946
-
More flexible exponentiation with precomputation
-
Proceedings of CRYPTO 1994, Santa Barbara, CA, USA, August
-
C. H. Lim and P. J. Lee. More flexible exponentiation with precomputation. In Proceedings of CRYPTO 1994, volume 839 of LNCS, pages 95-107, Santa Barbara, CA, USA, August 1994.
-
(1994)
LNCS
, vol.839
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
26
-
-
78650209785
-
Jack: Scalable accumulator-based nymble system
-
Chicago, IL, USA, October
-
Z. Lin and N. Hopper. Jack: Scalable accumulator-based nymble system. In Proceedings of WPES 2010, pages 53-62, Chicago, IL, USA, October 2010.
-
(2010)
Proceedings of WPES 2010
, pp. 53-62
-
-
Lin, Z.1
Hopper, N.2
-
27
-
-
84857081450
-
BNymble: More anonymous blacklisting at almost no cost
-
a short paper. Proceedings of FC 2011, Gros Islet, St. Lucia, February
-
P. Lofgren and N. Hopper. BNymble: More anonymous blacklisting at almost no cost (a short paper). In Proceedings of FC 2011, volume 7035 of LNCS, pages 268-275, Gros Islet, St. Lucia, February 2011.
-
(2011)
LNCS
, vol.7035
, pp. 268-275
-
-
Lofgren, P.1
Hopper, N.2
-
28
-
-
84944878354
-
-
CRC Press, Boca Raton, FL, USA, October 1996. Fifth Printing, August
-
A. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, USA, October 1996. Fifth Printing, August 2001.
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
29
-
-
85048607942
-
Resource requirements for the application of addition chains in modulo exponentiation
-
Proceedings of EUROCRYPT 1992, Balatonfüred, Hungary, May
-
J. Sauerbrey and A. Dietel. Resource requirements for the application of addition chains in modulo exponentiation. In Proceedings of EUROCRYPT 1992, volume 658 of LNCS, pages 174-182, Balatonfüred, Hungary, May 1992.
-
(1992)
LNCS
, vol.658
, pp. 174-182
-
-
Sauerbrey, J.1
Dietel, A.2
-
30
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Proceedings of CRYPTO 1989, Santa Barbara, CA, USA, August
-
C.-P. Schnorr. Efficient identification and signatures for smart cards. In Proceedings of CRYPTO 1989, volume 435 of LNCS, pages 239-252, Santa Barbara, CA, USA, August 1989.
-
(1989)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
31
-
-
84889061954
-
Contractual anonymity
-
E. J. Schwartz, D. Brumley, and J. M. McCune. Contractual anonymity. In Proceedings of NDSS 2010, San Diego, CA, USA, February 2010.
-
Proceedings of NDSS 2010, San Diego, CA, USA, February 2010
-
-
Schwartz, E.J.1
Brumley, D.2
McCune, J.M.3
-
33
-
-
77952377083
-
Blacklistable Anonymous Credentials: Blocking misbehaving users without TTPs
-
Alexandria, VA, USA, October
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable Anonymous Credentials: Blocking misbehaving users without TTPs. In Proceedings of CCS 2007, pages 72-81, Alexandria, VA, USA, October 2007.
-
(2007)
Proceedings of CCS 2007
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
34
-
-
78651408573
-
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
-
December
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Transactions on Information and System Security (TISSEC), 13(4):39:1-39:33, December 2010.
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.4
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
|