-
1
-
-
33749993205
-
Constant-size dynamic k-TAA
-
Proceedings of SCN 2006
-
M. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-TAA. Proceedings of SCN 2006, LNCS 4116 (2006), 111-125.
-
(2006)
LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.1
Susilo, W.2
Mu, Y.3
-
4
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Proceedings of CRYPTO 2009
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya and H. Shacham. Randomizable proofs and delegatable anonymous credentials. Proceedings of CRYPTO 2009, LNCS 5677, (2009), 108-125.
-
(2009)
LNCS
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
5
-
-
84983104598
-
On defining proofs of knowledge
-
Proceedings of CRYPTO 1992
-
M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. Proceedings of CRYPTO 1992, LNCS 740 (1993), 390-420
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
6
-
-
74049125197
-
Anonymous credentials on a standard java card
-
ACM Press
-
P. Bichsel, J. Camenisch, T. Groß, and V. Shoup. Anonymous Credentials on a Standard Java Card. Proceedings ACM CCS 2009, ACM Press, (2009) 600-610.
-
(2009)
Proceedings ACM CCS 2009
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
7
-
-
84947778144
-
The decision diffie-hellman problem
-
Proceedings of ANTS-III
-
D. Boneh. The Decision Diffie-Hellman Problem. Proceedings of ANTS-III, LNCS 1423 (1998), 48-63.
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
9
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Proceedings of EUROCRYPT 2001
-
J. Camenisch and A. Lysyanskaya. An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. Proceedings of EUROCRYPT 2001, LNCS 2045 (2001), 93-118.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
35248839965
-
A signature scheme with efficient protocols
-
Proceedings of SCN 2003
-
J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. Proceedings of SCN 2003, LNCS 2576 (2003), 268-289.
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Proceedings of CRYPTO 2004
-
J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. Proceedings of CRYPTO 2004, LNCS 3152 (2004), 56-72.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
44449176564
-
The twin diffie-hellman problem and applications proceedings of eurocrypt 2008
-
D. Cash, E. Kiltz, and V. Shoup. The Twin Diffie-Hellman Problem and Applications Proceedings of Eurocrypt 2008, LNCS 4965 (2008), 127-145.
-
(2008)
LNCS
, vol.4965
, pp. 127-145
-
-
Cash, D.1
Kiltz, E.2
Shoup, V.3
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10) (1985), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
84884477863
-
Shorter IBE and signatures via asymmetric pairings
-
Proceedings of Pairing 2012
-
J. Chen, H. Lim, S. Ling, H. Wang, and H. Wee. Shorter IBE and Signatures via Asymmetric Pairings. Proceedings of Pairing 2012, LNCS 7708,(2012), 122-140.
-
(2012)
LNCS
, vol.7708
, pp. 122-140
-
-
Chen, J.1
Lim, H.2
Ling, S.3
Wang, H.4
Wee, H.5
-
16
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Proceedings of EUROCRYPT'97
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. Proceedings of EUROCRYPT'97, LNCS 1233, (1997), 103-118.
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
17
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
Proceedings of EUROCRYPT 2000
-
I. Damgárd. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Proceedings of EUROCRYPT 2000, LNCS 1807 (2000), 418-430.
-
(2000)
LNCS
, vol.1807
, pp. 418-430
-
-
Damgárd, I.1
-
18
-
-
84859941399
-
Message authentication
-
Revisited. Proceedings of EUROCRYPT'12
-
Y. Dodis, E. Kiltz, K. Pietrzak, D. Wichs. Message Authentication, Revisited. Proceedings of EUROCRYPT'12, LNCS 7237 (2012), 355-374.
-
(2012)
LNCS
, vol.7237
, pp. 355-374
-
-
Dodis, Y.1
Kiltz, E.2
Pietrzak, K.3
Wichs, D.4
-
19
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Proceedings of CRYPTO 1986
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Proceedings of CRYPTO 1986, LNCS 263 (1987), 186-âA Ş194.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
20
-
-
33745123687
-
Communication-efficient non-interactive proofs of knowledge with online extractors
-
Proceedings of CRYPTO 2005
-
M. Fischlin. Communication-Efficient Non-Interactive Proofs of Knowledge with Online Extractors. Proceedings of CRYPTO 2005, LNCS 3621 (2005), 152-168.
-
(2005)
LNCS
, vol.3621
, pp. 152-168
-
-
Fischlin, M.1
-
21
-
-
84871534670
-
Dual form signatures: An approach for proving security from static assumptions
-
Proceedings of ASIACRYPT 2012
-
M. Gerbush, A. Lewko, A. O'Neill, and B. Waters Dual Form Signatures: An Approach for Proving Security from Static Assumptions. Proceedings of ASIACRYPT 2012, LNCS 7658 (2012), 25-42.
-
(2012)
LNCS
, vol.7658
, pp. 25-42
-
-
Gerbush, M.1
Lewko, A.2
O'Neill, A.3
Waters, B.4
-
23
-
-
84869463849
-
Specification of the identity mixer cryptographic library (revised version 2.3.0)
-
April
-
IBM. Specification of the Identity Mixer Cryptographic Library (Revised version 2.3.0). IBM Research Report RZ 3730, April 2010.
-
(2010)
IBM Research Report RZ 3730
-
-
IBM1
-
24
-
-
84927752554
-
Designated verifier proofs and their applications
-
Proceedings of EUROCRYPT 1996
-
M. Jakobsson, K.Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. Proceedings of EUROCRYPT 1996, LNCS 1070 (1996) 143-154.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
27
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology 4 (1991), 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
-
28
-
-
84957026429
-
Security of blind discrete log signatures against interactive attacks
-
ICICS 2001
-
C. Schnorr. Security of Blind Discrete Log Signatures Against Interactive Attacks. ICICS 2001, LNCS 2229 (2001), 1-12.
-
(2001)
LNCS
, vol.2229
, pp. 1-12
-
-
Schnorr, C.1
-
29
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Proceedings of EUROCRYPT'97
-
V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. Proceedings of EUROCRYPT'97, LNCS 1233 (1997), 256-266.
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
30
-
-
84958979582
-
On the security of ElGamal based encryption
-
Proceedings of PKC 1998
-
Y. Tsiounis and M. Yung On the security of ElGamal based encryption. Proceedings of PKC 1998, LNCS 1431 (1998), 117-134.
-
(1998)
LNCS
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
31
-
-
84946832516
-
The exact security of ecies in the generic group model
-
Proceedings of Cryptography and Coding, IMA Int. Conf.
-
N. Smart. The Exact Security of ECIES in the Generic Group Model. Proceedings of Cryptography and Coding, IMA Int. Conf., LNCS 2260 (2001), 73-84.
-
(2001)
LNCS
, vol.2260
, pp. 73-84
-
-
Smart, N.1
-
32
-
-
85025802492
-
How to strengthen any weakly unforgeable signature into a strongly unforgeable signature
-
Proceedings of CT-RSA 2007
-
R. Steinfeld, J. Pieprzyk and H. Wang. How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. Proceedings of CT-RSA 2007, LNCS 4377 (2007), 357-371.
-
(2007)
LNCS
, vol.4377
, pp. 357-371
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
33
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Proceedings of CRYPTO 2009
-
B. Waters. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Proceedings of CRYPTO 2009, LNCS 5677 (2009), 619-636.
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|