-
3
-
-
85034499239
-
All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions
-
[BD91], LNCS 473, Springer-Verlag
-
[BD91] Mike V. D. Burmester, Yvo Desmedt. All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions. Eurocrypt ’90 LNCS 473, Springer-Verlag 1991, 1-10.
-
(1991)
Eurocrypt ’90
, pp. 1-10
-
-
Burmester, M.V.D.1
Desmedt, Y.2
-
4
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
[CEG88], LNCS 304, Springer-Verlag
-
[CEG88] David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. Eurocrypt ’87. LNCS 304, Springer-Verlag 1988, 127-141.
-
(1988)
Eurocrypt ’87
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.-H.2
Van De Graaf, J.3
-
5
-
-
84948962858
-
Blind Signatures Based on the Discrete Logarithm Problem
-
[CPS95], LNCS 950, Springer-Verlag
-
[CPS95] Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler. Blind Signatures Based on the Discrete Logarithm Problem. Eurocrypt ’94. LNCS 950, Springer-Verlag 1995, 428-432.
-
(1995)
Eurocrypt ’94
, pp. 428-432
-
-
Camenisch, J.L.1
Piveteau, J.-M.2
Stadler, M.A.3
-
6
-
-
0008538346
-
A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm
-
[DeL84]
-
[DeL84] John M. DeLaurentis. A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. Cryptologia 8/3 (1984) 253-259.
-
(1984)
Cryptologia
, vol.8
, Issue.3
, pp. 253-259
-
-
DeLaurentis, J.M.1
-
8
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
[E1G85]
-
[E1G85] Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 31/4 (1985) 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
9
-
-
0024135240
-
Zero-Knowledge Proofs of Identity
-
[FFS88]
-
[FFS88] Uriel Feige, Amos Fiat, Adi Shamir. Zero-Knowledge Proofs of Identity. Journal of Cryptology 1/2 (1988) 77-94.
-
(1988)
Journal of Cryptology
, vol.1-2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
[FS87], LNCS 263, Springer-Verlag
-
[FS87] Amos Fiat, Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto ’86. LNCS 263, Springer-Verlag 1987, 186-194.
-
(1987)
Crypto ’86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
[GMR89]
-
[GMR89] Shafi Goldwasser, Silvio Micali, Charles Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Computing. 18/1 (1989) 186-207.
-
(1989)
SIAM J. Computing
, vol.18
, Issue.1
, pp. 186-207
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
12
-
-
84955580392
-
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications
-
[HMP95], LNCS 917, Springer-Verlag
-
[HMP95] Patrick Horster, Markus Michels, Holger Petersen. Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Asiacrypt ’94. LNCS 917, Springer-Verlag 1995, 224-237.
-
(1995)
Asiacrypt ’94
, pp. 224-237
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
13
-
-
84957688681
-
An encrypted key transmission protocol
-
[Hug94], presentation, August
-
[Hug94] Eric Hughes. An encrypted key transmission protocol. Crypto ’94 Rump Session presentation, August 1994.
-
(1994)
Crypto ’94 Rump Session
-
-
Hughes, E.1
-
14
-
-
0003056823
-
Any Language in IP has a Divertible ZKIP
-
[ISS91], Springer-Verlag
-
[ISS91] Toshija Itoh, Kouichi Sakurai, Hiroki Shizuya. Any Language in IP has a Divertible ZKIP. AsiaCrypt ’91. Springer-Verlag 1993, 382-396.
-
(1993)
AsiaCrypt ’91
, pp. 382-396
-
-
Itoh, T.1
Sakurai, K.2
Shizuya, H.3
-
16
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
[MU096]
-
[MU096] Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fund, of Electronic Communications and Comp Sci. E79-A/9 (1996) 1338-1354.
-
(1996)
IEICE Trans. Fund, of Electronic Communications and Comp Sci
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
35848959662
-
A proposed federal information processing standard for digital signature standard (DSS)
-
[NIS91], August, Standards Publication (FIPS)
-
[NIS91] NIST. A proposed federal information processing standard for digital signature standard (DSS). Draft Tech. Rep. FIPS PUB XXX, August 1991. Standards Publication (FIPS)
-
(1991)
Draft Tech. Rep. FIPS PUB XXX
-
-
NIST1
-
18
-
-
85032864442
-
Divertible zero-knowledge interactive proofs and commutative random self-reducibility
-
LNCS 434, Springer-Verlag
-
Tatsuaki Okamoto, Kazuo Ohta. Divertible zero-knowledge interactive proofs and commutative random self-reducibility. Eurocrypt ’89 LNCS 434, Springer-Verlag 1990, 134-149.
-
(1990)
Eurocrypt ’89
, pp. 134-149
-
-
Okamoto, T.1
Ohta, K.2
-
19
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
[RSA78], reprinted: 26/1 (1983) 96-99
-
[RSA78] Ronald L. Rivest, Adi Shamir, Leonhard Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM21/2 (1978) 120-126, reprinted: 26/1 (1983) 96-99.
-
(1978)
CACM21/2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
0343349510
-
A "Weak" Privacy Protocol Using the RSA Crypto Algorithm
-
[Sim83]
-
[Sim83] Gustavus J. Simmons. A "Weak" Privacy Protocol Using the RSA Crypto Algorithm. Cryptologia 7/2 (1983) 180-182.
-
(1983)
Cryptologia
, vol.7
, Issue.2
, pp. 180-182
-
-
Simmons, G.J.1
-
21
-
-
0001217738
-
The Prisoners’ Problem and the Subliminal Channel
-
[Sim84], Plenum Press, New York
-
[Sim84] Gustavus J. Simmons. The Prisoners’ Problem and the Subliminal Channel. Crypto ’83. Plenum Press, New York 1984, 51-67.
-
(1984)
Crypto ’83
, pp. 51-67
-
-
Simmons, G.J.1
|