-
1
-
-
84945119655
-
A secure three-move blind signature scheme for polynomially many signatures
-
M. Abe. A secure three-move blind signature scheme for polynomially many signatures. In EUROCRYPT'01, pages 136-151, 2001.
-
(2001)
EUROCRYPT'01
, pp. 136-151
-
-
Abe, M.1
-
2
-
-
84974652864
-
Provably secure partially blind signatures
-
Springer-Verlag
-
M. Abe and T. Okamoto. Provably secure partially blind signatures. In CRYPTO'00, pages 271-286. Springer-Verlag, 2000.
-
(2000)
CRYPTO'00
, pp. 271-286
-
-
Abe, M.1
Okamoto, T.2
-
5
-
-
69949179634
-
Compact e-cash and simulatable vrfs revisited
-
M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya. Compact e-cash and simulatable vrfs revisited. In Pairing '09, pages 114-131, 2009.
-
(2009)
Pairing '09
, pp. 114-131
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
6
-
-
74049125197
-
Anonymous credentials on a standard java card
-
ACM
-
P. Bichsel, J. Camenisch, T. Groß, and V. Shoup. Anonymous credentials on a standard java card. CCS '09, pages 600-610. ACM, 2009.
-
(2009)
CCS '09
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
7
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
-
London, UK, UK, Springer-Verlag
-
A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. PKC '03, pages 31-46, London, UK, UK, 2003. Springer-Verlag.
-
(2003)
PKC '03
, pp. 31-46
-
-
Boldyreva, A.1
-
8
-
-
84867248592
-
Untraceable off-line cash in wallets with observers
-
S. Brands. Untraceable off-line cash in wallets with observers. In CRYPTO'93, pages 302-318, 1993.
-
(1993)
CRYPTO'93
, pp. 302-318
-
-
Brands, S.1
-
11
-
-
24944435537
-
Compact e-cash
-
EUROCRYPT '05, Springer-Verlag
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact e-cash. In EUROCRYPT '05, volume 3494 of LNCS, pages 302-321. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
12
-
-
23944509128
-
Efficient blind signatures without random oracles
-
J. Camenisch, M. Koprowski, and B. Warinschi. Efficient blind signatures without random oracles. SCN'04, pages 134-148, 2005.
-
(2005)
SCN'04
, pp. 134-148
-
-
Camenisch, J.1
Koprowski, M.2
Warinschi, B.3
-
13
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
London, UK, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. EUROCRYPT '01, pages 93-118, London, UK, 2001. Springer-Verlag.
-
(2001)
EUROCRYPT '01
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
CRYPTO'04
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO'04, LNCS 3152, pages 56-72, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
0011390710
-
Proving in zero-knowledge that a number is the product of two safe primes
-
Springer-Verlag
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. EUROCRYPT'99. Springer-Verlag, 1999.
-
(1999)
EUROCRYPT'99
-
-
Camenisch, J.1
Michels, M.2
-
17
-
-
0020915882
-
Blind signatures for untraceable payment
-
D. Chaum. Blind signatures for untraceable payment. In Crypto'82, pages 199-203, 1982.
-
(1982)
Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
18
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO '94, pages 174-187. Springer-Verlag, 1994.
-
(1994)
CRYPTO '94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
19
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
Springer-Verlag
-
I. Damgård. Commitment schemes and zero-knowledge protocols. In Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. Springer-Verlag, 1999.
-
(1999)
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
-
-
Damgård, I.1
-
20
-
-
84889019758
-
On σ - protocols
-
I. Damgård. On σ - protocols. In Course Notes, http://www.daimi.au.dk/ivan/Sigma.ps, 2002.
-
(2002)
Course Notes
-
-
Damgård, I.1
-
21
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, pages 186-194. Springer-Verlag, 1986.
-
(1986)
CRYPTO '86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
22
-
-
80052020660
-
Round optimal blind signatures
-
S. Garg, V. Rao, A. Sahai, D. Schröder, and D. Unruh. Round optimal blind signatures. In CRYPTO'11, pages 630-648, 2011.
-
(2011)
CRYPTO'11
, pp. 630-648
-
-
Garg, S.1
Rao, V.2
Sahai, A.3
Schröder, D.4
Unruh, D.5
-
23
-
-
0003979335
-
-
Basic Tools. Cambridge University Press
-
O. Goldreich. Foundations of Cryptography, vol. 1: Basic Tools. Cambridge University Press, 2001.
-
(2001)
Foundations of Cryptography
, vol.1
-
-
Goldreich, O.1
-
24
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
February
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18:186-208, February 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
26
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In EUROCRYPT '88, pages 123-128, 1988.
-
(1988)
EUROCRYPT '88
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
27
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In CHES'04, pages 119-132, 2004.
-
(2004)
CHES'04
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
28
-
-
84884956932
-
Efficient e-cash in practice: NFC-based payments for public transportation systems
-
G. Hinterwälder, C. T. Zenger, F. Baldimtsi, A. Lysyanskaya, C. Paar, and W. P. Burleson. Efficient e-cash in practice: NFC-based payments for public transportation systems. In Privacy Enhancing Technologies - PETS'13, pages 40-59, 2013.
-
(2013)
Privacy Enhancing Technologies - PETS'13
, pp. 40-59
-
-
Hinterwälder, G.1
Zenger, C.T.2
Baldimtsi, F.3
Lysyanskaya, A.4
Paar, C.5
Burleson, W.P.6
-
29
-
-
84958591696
-
Security of blind digital signatures
-
extended abstract. Springer-Verlag
-
A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures (extended abstract). In CRYPTO'97, pages 150-164. Springer-Verlag, 1997.
-
(1997)
CRYPTO'97
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
30
-
-
84945556728
-
Privacy by design - principles of privacy - aware ubiquitous systems
-
Springer Berlin, Heidelberg
-
M. Langheinrich. Privacy by design - principles of privacy - aware ubiquitous systems. In Ubicomp 2001: Ubiquitous Computing, volume 2201, pages 273-291. Springer Berlin, Heidelberg, 2001.
-
(2001)
Ubicomp 2001: Ubiquitous Computing
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
34
-
-
33745554010
-
Efficient blind and partially blind signatures without random oracles
-
TCC'06, Springer
-
T. Okamoto. Efficient blind and partially blind signatures without random oracles. In TCC'06, volume 3876 of Lecture Notes in Computer Science, pages 80-99. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 80-99
-
-
Okamoto, T.1
-
35
-
-
80955132163
-
U-prove cryptographic specification v1.1
-
February
-
C. Paquin. U-prove cryptographic specification v1.1. In Microsoft Technical Report, http://connect.microsoft.com/site1188, February 2011.
-
(2011)
Microsoft Technical Report
-
-
Paquin, C.1
-
36
-
-
84889026012
-
Regulation (ec) 45/2001
-
E. Parliament and C. of the European Union
-
E. Parliament and C. of the European Union. Regulation (ec) 45/2001. In Official Journal of the European Union, 2001.
-
(2001)
Official Journal of the European Union
-
-
-
37
-
-
84892385130
-
Directive 2009/136/ec
-
E. Parliament and C. of the European Union
-
E. Parliament and C. of the European Union. Directive 2009/136/ec. In Official Journal of the European Union, 2009.
-
(2009)
Official Journal of the European Union
-
-
-
38
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer-Verlag
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. CRYPTO '91. Springer-Verlag.
-
CRYPTO '91
-
-
Pedersen, T.P.1
-
39
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. In Journal Of Cryptology, volume 13, pages 361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
40
-
-
84955579666
-
Provably secure blind signature schemes
-
Asiacrypt '96, Springer-Verlag, Feb
-
D. Pointcheval and J. Stern. Provably secure blind signature schemes. In Asiacrypt '96, LNCS 1163, pages 252-265. Springer-Verlag, Feb 2011.
-
(2011)
LNCS
, vol.1163
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
41
-
-
84889055447
-
National strategy for trusted identities in cyberspace
-
H. A. Schmidt. National strategy for trusted identities in cyberspace. In Cyberwar Resources Guide, Item 163, http://www.projectcyw-d.org/resources/ items/show/163, 2010.
-
(2010)
Cyberwar Resources Guide, Item 163
-
-
Schmidt, H.A.1
-
42
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. P. Schnorr. Efficient identification and signatures for smart cards. CRYPTO '89, pages 239-252, 1989.
-
(1989)
CRYPTO '89
, pp. 239-252
-
-
Schnorr, C.P.1
-
43
-
-
84869463849
-
Specification of the identity mixer cryptographic library
-
I. S. Team. version 2.3.0
-
I. S. Team. Specification of the identity mixer cryptographic library, version 2.3.0. In IBM Research Report, 2010.
-
(2010)
IBM Research Report
-
-
|