Unconditionally Anonymous Ring and Mesh Signatures
暂无分享,去创建一个
[1] Matthew Green,et al. Practical Short Signature Batch Verification , 2009, CT-RSA.
[2] Dan Boneh,et al. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups , 2008, Journal of Cryptology.
[3] Jens Groth,et al. Fully Anonymous Group Signatures without Random Oracles , 2007, IACR Cryptol. ePrint Arch..
[4] Amit Sahai,et al. Ring Signatures of Sub-linear Size Without Random Oracles , 2007, ICALP.
[5] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[6] Hovav Shacham,et al. Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.
[7] Brent Waters,et al. Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.
[8] Xavier Boyen,et al. Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants , 2007, IACR Cryptol. ePrint Arch..
[9] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[10] Tsz Hon Yuen,et al. ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.
[11] Melissa Chase,et al. On Signatures of Knowledge , 2006, CRYPTO.
[12] Rafail Ostrovsky,et al. Non-interactive Zaps and New Techniques for NIZK , 2006, CRYPTO.
[13] Jung Hee Cheon,et al. Security Analysis of the Strong Diffie-Hellman Problem , 2006, EUROCRYPT.
[14] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[15] Tsz Hon Yuen,et al. (Hierarchical Identity-Based) Threshold Ring Signatures , 2006, IACR Cryptol. ePrint Arch..
[16] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[17] Siu-Ming Yiu,et al. Identity Based Ring Signature: Why, How and What Next , 2005, EuroPKI.
[18] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[19] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[20] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[21] Qi Wen-feng. Signatures of Knowledge , 2005 .
[22] Jan Camenisch,et al. Practical Group Signatures without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[23] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[24] C. Dwork,et al. Concurrent zero-knowledge , 2004, JACM.
[25] Victor S. Miller,et al. The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.
[26] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[27] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[28] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[29] Aggelos Kiayias,et al. Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.
[30] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[31] Germán Sáez,et al. New Distributed Ring Signatures for General Families of Signing Subsets , 2004, IACR Cryptol. ePrint Arch..
[32] Germán Sáez,et al. Forking Lemmas for Ring Signature Schemes , 2003, INDOCRYPT.
[33] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[34] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[35] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[36] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[37] Moni Naor,et al. Deniable Ring Authentication , 2002, CRYPTO.
[38] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[39] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[40] Marten van Dijk. A Linear Construction of Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[41] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[42] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[43] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[44] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.