-
1
-
-
84957715741
-
Universally verifiable mix-net with verification work independent of the number of mix-centers
-
M. Abe, “Universally verifiable mix-net with verification work independent of the number of mix-centers,” Eurocrypt’98, pp. 437-447.
-
Eurocrypt’98
, pp. 437-447
-
-
Abe, M.1
-
2
-
-
84937500008
-
A mix-network on permutation networks
-
(in Japanese) (May
-
M. Abe, “A mix-network on permutation networks,” ISEC Technical report 99-10 (in Japanese) (May, 1999)
-
(1999)
ISEC Technical Report 99-10
-
-
Abe, M.1
-
3
-
-
84956854310
-
Mix-networks on permutation networks
-
M. Abe, “Mix-networks on permutation networks,” Asiacrypt’99, pp. 258-273.
-
Asiacrypt’99
, pp. 258-273
-
-
Abe, M.1
-
4
-
-
84957629783
-
Relations among notions of security for public key encryption schemes
-
M. Bellare, A. Desai, D. Poincheval, P. Rogaway, “Relations among notions of security for public key encryption schemes,” Crypto’98, pp. 26-45.
-
Crypto’98
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Poincheval, D.3
Rogaway, P.4
-
5
-
-
84948986458
-
Optimal asymmetric encryption - How to encrypt with RSA
-
M. Bellare, P. Rogaway, “Optimal asymmetric encryption - How to encrypt with RSA,” Eurocrypt’94, pp. 92-111.
-
Eurocrypt’94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, Vol. 24, 1981, pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
85032883059
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” Crypto’84, pp. 10-18.
-
Crypto’84
, pp. 10-18
-
-
Elgamal, T.1
-
11
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
A. Fujioka, T. Okamoto, K. Ohta, “A practical secret voting scheme for large scale elections,” Auscrypt’92, pp. 244-251.
-
Auscrypt’92
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
12
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, “Robust and efficient sharing of RSA functions,” Crypto’96, pp. 157-172.
-
Crypto’96
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
0002986499
-
Mix-based electronic payments
-
M. Jakobsson, D. M’Raihi, “Mix-based electronic payments,” SAC’98, pp. 157-173.
-
SAC’98
, pp. 157-173
-
-
Jakobsson, M.1
M’Raihi, D.2
-
15
-
-
33646777352
-
Flash mixing
-
M. Jakobsson, “Flash mixing,” PODC’99, pp. 83-89.
-
PODC’99
, pp. 83-89
-
-
Jakobsson, M.1
-
17
-
-
0038933986
-
Covering design I: Coverings by a small number of subsets
-
W. H. Mills, “Covering design I: coverings by a small number of subsets,” Ars Combin. 8, (1979), pp. 199-315.
-
(1979)
Ars Combin
, vol.8
, pp. 199-315
-
-
Mills, W.H.1
-
18
-
-
0002986502
-
Fault tolerant anonymous channel
-
W. Ogata, K. Kurosawa, K. Sako, K. Takatani, “Fault tolerant anonymous channel,” ICICS’97, pp. 440-444.
-
ICICS’97
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
19
-
-
0000900573
-
All/nothing election scheme and anonymous channel
-
C. Park, K. Itoh, K. Kurosawa, “All/nothing election scheme and anonymous channel,” Eurocrypt’93, pp. 248-259.
-
Eurocrypt’93
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
20
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T. P. Pedersen, “A threshold cryptosystem without a trusted party,” Eurocrypt’91, pp. 522-526.
-
Eurocrypt’91
, pp. 522-526
-
-
Pedersen, T.P.1
-
21
-
-
85032859691
-
How to break the direct RSA-implementation of MIXes
-
B. Pfitzmann, A. Pfitzmann. “How to break the direct RSA-implementation of MIXes,” Eurocrypt’89, pp. 373-381.
-
Eurocrypt’89
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
22
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval, J. Stern, “Security proofs for signature schemes,” Eurocrypt’96, pp. 387-398.
-
Eurocrypt’96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
23
-
-
0039527186
-
An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme
-
R. Rees, D. R. Stinson, R. Wei, G. H. J. van Rees, “An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme,” Ars Combin. 531 (1999), pp. 225-237.
-
(1999)
Ars Combin
, vol.531
, pp. 225-237
-
-
Rees, R.1
Stinson, D.R.2
Wei, R.3
Van Rees, G.H.4
-
24
-
-
84957356080
-
Receipt-free mix-type voting scheme
-
K. Sako, J. Kilian, “Receipt-free mix-type voting scheme,” Eurocrypt’95, pp. 393-403.
-
Eurocrypt’95
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
25
-
-
0000537828
-
Efficient signature generation for smart cards
-
C. P. Schnorr, “Efficient signature generation for smart cards,” Crypto’89, pp. 239-252.
-
Crypto’89
, pp. 239-252
-
-
Schnorr, C.P.1
-
27
-
-
0018545449
-
How to share a secret
-
A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, 1979, pp. 612-613
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
84958979582
-
On the security of ElGamal based encryption
-
Y. Tsiounis, M. Yung, “On the security of ElGamal based encryption,” PKC’98, pp. 117-134.
-
PKC’98
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
|