-
2
-
-
84947809553
-
A Group Signature Scheme with Improved Efficiency
-
Springer-Verlag
-
J. Camenisch and M. Michels. A Group Signature Scheme with Improved Efficiency. In Asiacrypt’98, LNCS 1514. Springer-Verlag, 1998.
-
(1998)
Asiacrypt’98, LNCS 1514
-
-
Camenisch, J.1
Michels, M.2
-
3
-
-
85001025766
-
Wallet Databases with Observers
-
Springer-Verlag
-
D. Chaum and T. P. Pedersen. Wallet Databases with Observers. In Crypto’92, LNCS 740, pages 89-105. Springer-Verlag, 1992.
-
(1992)
Crypto’92, LNCS 740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
5
-
-
84957375076
-
A Secure and Optimally Efficient Multi-Authority Election Scheme
-
Springer-Verlag
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Eurocrypt’97., LNCS 1233, pages 113-118. Springer-Verlag, 1997.
-
(1997)
Eurocrypt’97., LNCS 1233
, pp. 113-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
6
-
-
0008095081
-
-
Technical report, Department of E.E. and C.S. University of Wisconsin-Milwaukee, April, TR-92-04-02
-
Y. Desmedt and Y. Frankel.: Parallel reliable threshold multisignature. Technical report, Department of E.E. and C.S. University of Wisconsin-Milwaukee, April 1992. TR-92-04-02.
-
(1992)
Parallel Reliable Threshold Multisignature
-
-
Desmedt, Y.1
Frankel, Y.2
-
7
-
-
0031375570
-
Optimal-Resilience Proactive Public-Key Cryptosystems
-
IEEE
-
Y. Frankel, P. Gemmel, Ph. MacKenzie, and M. Yung. Optimal-Resilience Proactive Public-Key Cryptosystems. In Proc. 38th FOGS, pages 384-393. IEEE, 1997.
-
(1997)
Proc. 38Th FOGS
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
Mackenzie, P.H.3
Yung, M.4
-
8
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In Crypto’96, LNCS 1109, pages 157-172. Springer-Verlag, 1996.
-
(1996)
Crypto’96, LNCS 1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
84888872516
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Springer-Verlag
-
R. Gennaro and V. Shoup. Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In Eurocrypt’98, LNCS 1403, pages 1-16. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, LNCS 1403
, pp. 1-16
-
-
Gennaro, R.1
Shoup, V.2
-
10
-
-
84958038323
-
Publicly Verifiable Lotterie: Applications of Delaying Functions
-
Springer-Verlag
-
D.M. Goldschlag and S.G. Stubblebine. Publicly Verifiable Lotterie: Applications of Delaying Functions. In Financial Crypto’98, LNCS 1465, pages 214-226. Springer-Verlag, 1998.
-
(1998)
Financial Crypto’98, LNCS 1465
, pp. 214-226
-
-
Goldschlag, D.M.1
Stubblebine, S.G.2
-
12
-
-
0032218237
-
A New Public Key Cryptosystem Based on Higher Residues
-
ACM press
-
D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. In Proc. of the 5th CCCS. ACM press, 1998.
-
(1998)
Proc. Of the 5Th CCCS
-
-
Naccache, D.1
Stern, J.2
-
13
-
-
84956852274
-
A New Public-Key Cryptosystem as Secure as Factoring
-
Springer-Verlag
-
T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring. In Eurocrypt’98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, LNCS 1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
14
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Springer-Verlag
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Eurocrypt’99, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Eurocrypt’99, LNCS 1592
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
84957640282
-
Security Analysis of a Practical”on the fly” Authentication and Signature Generation
-
Springer-Verlag
-
G. Poupard and J. Stern. Security Analysis of a Practical”on the fly” Authentication and Signature Generation. In Eurocrypt’98, LNCS 1403, pages 422-436. Springer-Verlag, 1998.
-
(1998)
Eurocrypt’98, LNCS 1403
, pp. 422-436
-
-
Poupard, G.1
Stern, J.2
-
16
-
-
84957689308
-
A Simplified Approach to Threshold and Proactive RSA
-
Springer-Verlag
-
T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In Crypto’98, LNCS 1462, pages 89-104. Springer-Verlag, 1998.
-
(1998)
Crypto’98, LNCS 1462
, pp. 89-104
-
-
Rabin, T.1
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
0027961556
-
How to share a function securely
-
ACM
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proceedings of the 26th, ACM Symposium on the Theory of Computing, pages 522-523. ACM, 1994.
-
(1994)
Proceedings of the 26Th, ACM Symposium on the Theory of Computing
, pp. 522-523
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
19
-
-
85032873931
-
Efficient Identification and Signatures for Smart Cards
-
Springer-Verlag
-
C. P. Schnorr. Efficient Identification and Signatures for Smart Cards. In Crypto’89, LNCS 435, pages 235-251. Springer-Verlag, 1990.
-
(1990)
Crypto’89, LNCS 435
, pp. 235-251
-
-
Schnorr, C.P.1
-
20
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
0001000209
-
-
Technical report, IBM, IBM Research Report RZ 3121
-
V. Shoup. Practical Threshold Signatures. Technical report, IBM, 1999. IBM Research Report RZ 3121.
-
(1999)
Practical Threshold Signatures
-
-
Shoup, V.1
|