-
5
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
T. Helleseth, editor, Advances in Cryptology - EUROCRYPT ' 93, International Association for Cryptologic Research, Springer- Verlag, Berlin Germany, Extended abstract
-
J. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT ' 93, vol ume 765 of Lecture Notes in Computer Science, pages 274-285. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1994. Extended abstract.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. CRYPTO 01, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 01, pages 213-229. Springer-Verlag, 2001. LNCS 2139.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short signatures from the weil pairing
-
ASIACRYPT01: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In ASIACRYPT01: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 2001.
-
(2001)
LNCS
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
84855307917
-
Restrictive binding of secret-key certificates
-
L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology - EUROCRYPT 95, Springer-Verlag, 21-25 May
-
S. Brands. Restrictive binding of secret-key certificates. In L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology - EUROCRYPT 95, volume 921 of Lecture Notes in Computer Science, pages 231-247. Springer-Verlag, 21-25 May 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 231-247
-
-
Brands, S.1
-
9
-
-
84945135810
-
Efficient nontransferable anonymous multishow credential system with optional anonymity revocation
-
Proc. EUROCRYPT 00, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya. Efficient nontransferable anonymous multishow credential system with optional anonymity revocation. In Proc. EUROCRYPT 00, pages 93-118. Springer-Verlag, 2001. LNCS 2045.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology Crypto 2002, pages 61-76, 2002.
-
(2002)
Advances in Cryptology Crypto 2002
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, Oct 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
85024290278
-
Group signatures
-
Proc. EUROCRYPT 91, Springer-Verlag
-
D. Chaum and E. van Heijst. Group signatures. In Proc. EUROCRYPT 91, pages 257-265. Springer-Verlag, 1991. LNCS 547.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heijst, E.2
-
15
-
-
84985922619
-
Tracing traitors
-
Y. G. Desmedt, editor, Proc. CRYPTO 94, Springer
-
B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Y. G. Desmedt, editor, Proc. CRYPTO 94, pages 257-270. Springer, 1994. Lecture Notes in Computer Science No. 839.
-
(1994)
Lecture Notes in Computer Science
, Issue.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
16
-
-
0004035649
-
-
IETF - Network Working Group, The Internet Society, January RFC 2246
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. IETF - Network Working Group, The Internet Society, January 1999. RFC 2246.
-
(1999)
The TLS Protocol Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
20
-
-
0004115841
-
-
IETF - Network Working Group, The Internet Society, November RFC 2409
-
D. Harkins and D. Carrel. The Internet Key Exchange (IKE). IETF - Network Working Group, The Internet Society, November 1998. RFC 2409.
-
(1998)
The Internet Key Exchange (IKE)
-
-
Harkins, D.1
Carrel, D.2
-
21
-
-
0037974305
-
Exponent group signature schemes and efficient identity based signature schemes based on pairings
-
Report
-
F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive
-
-
Hess, F.1
-
22
-
-
84927752554
-
Designated verifier proofs and their applications
-
U. Maurer, editor, Advances in Cryptology - EUROCRYPT 96, Springer-Verlag, 12-16 May
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, pages 143-154. Springer-Verlag, 12-16 May 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
25
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In Selected Areas of Cryptography 1999, pages 184-199, 1999.
-
(1999)
Selected Areas of Cryptography 1999
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
27
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, January
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In Proceedings of the Symposium on Cryptography and Information Security (SCIS 2000), Okinawa, Japan, January 2000.
-
(2000)
Proceedings of the Symposium on Cryptography and Information Security (SCIS 2000)
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
28
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, Springer
-
A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, pages 47-53. Springer, 1985. Lecture Notes in Computer Science No. 196.
-
(1985)
Lecture Notes in Computer Science
, Issue.196
, pp. 47-53
-
-
Shamir, A.1
-
29
-
-
84946849368
-
Self-blindable credential certificates from the weil pairing
-
E. Verheul. Self-blindable credential certificates from the weil pairing. In Advances in Cryptology Asiacrypt 2001, pages 533-551, 2001.
-
(2001)
Advances in Cryptology Asiacrypt 2001
, pp. 533-551
-
-
Verheul, E.1
|