-
1
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
[BCC88]
-
[BCC88] G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. JCSS, 37(2): 156-189, 1988.
-
(1988)
JCSS
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
2
-
-
84958769452
-
Convertible undeniable signatures
-
A.J. MenezesandS. A. Vanstone,editors, Springer- Verlag, Lecture Notes in Computer Science No. 537. [BCDP91]
-
[BCDP91] J. Boyar, D, Chaum, I. Damgârd, and T. Pedersen. Convertible undeniable signatures. In A.J. MenezesandS. A. Vanstone,editors, Proc. CRYPTO 90, pages 189-205. Springer- Verlag, 1991. Lecture Notes in Computer Science No. 537.
-
(1991)
Proc. CRYPTO 90
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgârd, I.3
Pedersen, T.4
-
4
-
-
0002181960
-
Digital Multisignatures
-
H. Baker and F. Piper, editors, Claredon Press, [Boy86]
-
[Boy86] C. Boyd. Digital Multisignatures. In H. Baker and F. Piper, editors, Cryptography and Coding, pages 241-246. Claredon Press, 1986.
-
(1986)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
5
-
-
0001868672
-
Optimal asymmetric encryption
-
[BR94]
-
[BR94] M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Euwcrypt'94,1994.
-
(1994)
Euwcrypt'94
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0010252194
-
Undeniable signatures
-
In G. Brassard, editor, Springer-Verlag. Lecture Notes in Computer Science No, 435. [CA90]
-
[CA90] David Chaum and Hans Van Antwerpen. Undeniable signatures. In G. Brassard, editor, Proc. CRYPTO 89, pages 212-217. Springer-Verlag, 1990. Lecture Notes in Computer Science No, 435.
-
(1990)
Proc. CRYPTO 89
, pp. 212-217
-
-
Chaum, D.1
Van Antwerpen, H.2
-
7
-
-
0003055276
-
Zero-knowledge undeniable signatures
-
Springer-Verlag, Lecture Notes in Computer Science No. 473. [Cha90]
-
[Cha90] D. Chaum. Zero-knowledge undeniable signatures. In Proc. EUROCRYPT 90, pages 458-464. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 473.
-
(1990)
Proc. EUROCRYPT 90
, pp. 458-464
-
-
Chaum, D.1
-
8
-
-
0027961556
-
How to share a function securely
-
Santa Fe. IEEE. [DDFY94]
-
[DDFY94] Alfredo De Santis, Yvo Desmedt, Yair Frankel, and Moti Yung. How to share a function securely. In Proc. 26th ACM Symp. on Theory of Computing, pages 522-533, Santa Fe, 1994. IEEE.
-
(1994)
Proc. 26th ACM Symp. on Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
10
-
-
85023809951
-
Threshold cryptosystems
-
In G. Brassard, editor, Springer-Verlag. Lecture Notes in Computer Science No. 435. [DF90]
-
[DF90] Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In G. Brassard, editor, Proc. CRYPTO 89, pages 307-315. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.
-
(1990)
Proc. CRYPTO 89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
11
-
-
85022187530
-
Shared generation of authenticators and signatures
-
J. Feigenbaum, editor, Springer, Lecture Notes in Computer Science No. 576. [DF92]
-
[DF92] Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 457-469. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proc. CRYPTO 91
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
13
-
-
0029713931
-
Witness-based Cryptographic Program Checking and Robust Function Sharing
-
To appear in [FGY96]
-
[FGY96] Y. Frankel, P. Gemmell, and M. Yung. Witness-based Cryptographic Program Checking and Robust Function Sharing. To appear in proceedings of STOC96,1996.
-
(1996)
Proceedings of STOC96
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
15
-
-
0021409284
-
Probabilistic encryption
-
April [GM84]
-
[GM84] S. GoldwasserandS. Micali. Probabilistic encryption. JCSS, 28(2):270-299, April 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April [GMR88]
-
[GMR88] Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SÍAMJ. Computing, 17(2):281-308, April 1988.
-
(1988)
SÍAMJ. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
17
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
February [GMR89]
-
[GMR89] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM.J. Computing, 18(l):186-208, February 1989.
-
(1989)
SIAM.J. Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
0022914590
-
Proofs that Yield Nothing but the Validity of the Assertion, and a Methodology of Cryptographic Protocol Design
-
ACM, [GMW86]
-
[GMW86] O. Goldreich, S. Micali, and A. Wigderson. Proofs that Yield Nothing but the Validity of the Assertion, and a Methodology of Cryptographic Protocol Design. In Proceeding 27th Annual Symposium on the Foundations of Computer Science, pages 174-187. ACM, 1986.
-
(1986)
Proceeding 27th Annual Symposium on the Foundations of Computer Science
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
33748209465
-
Foundation of Cryptography - Fragments of a Book
-
February [Gol95]
-
[Gol95] Oded Goldreich. Foundation of Cryptography - Fragments of a Book. Electronic Colloquium on Computational Complexity, February 1995. Available online from http://www.eccc.uni-trier.de/eccc/.
-
(1995)
Electronic Colloquium on Computational Complexity
-
-
Goldreich, O.1
-
21
-
-
0010216321
-
Fair public-key cryptosystems
-
In Emest F. Brickell, editor, Springer-Verlag. Lecture Notes in Computer Science No. 740. [Mic92]
-
[Mic92] Silvio Micali. Fair public-key cryptosystems. In Emest F. Brickell, editor, Proc. CRYPTO 92, pages 113-138. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740.
-
(1992)
Proc. CRYPTO 92
, pp. 113-138
-
-
Micali, S.1
-
22
-
-
0000129601
-
Distributed provers with applications to undeniable signatures
-
[Ped91]
-
[Ped91] T. Pedersen, Distributed provers with applications to undeniable signatures. In Euro- crypt'9l, 1991.
-
(1991)
Euro- crypt'9l
-
-
Pedersen, T.1
-
23
-
-
0028542745
-
Robust Sharing of Secrets When the Dealer is Honest or Faulty
-
[Rab94]
-
[Rab94] T. Rabin. Robust Sharing of Secrets When the Dealer is Honest or Faulty. Journal of the ACM, 41(6): 1089-1109,1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.6
, pp. 1089-1109
-
-
Rabin, T.1
-
25
-
-
0018545449
-
How to Share a Secret
-
[Sha79]
-
[Sha79] A. Shamir. How to Share a Secret. Communications of the ACM, 22:612-613,1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|