Universal Re-encryption for Mixnets
暂无分享,去创建一个
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[3] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[4] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[5] Birgit Pfitzmann,et al. How to Break the Direct RSA-Implementation of Mixes , 1990, EUROCRYPT.
[6] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[7] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[8] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[9] Giovanni Di Crescenzo,et al. On monotone formula closure of SZK , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[10] Hannes Federrath,et al. MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.
[11] Kazue Sako,et al. Fault tolerant anonymous channel , 1997, ICICS.
[12] Paul F. Syverson,et al. Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.
[13] Andreas Pfitzmann,et al. Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks , 1998, ACISP.
[14] Markus Jakobsson,et al. Mix-Based Electronic Payments , 1998, Selected Areas in Cryptography.
[15] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[16] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[17] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[18] Masayuki Abe,et al. Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers , 1998, EUROCRYPT.
[19] D. Boneh. The Decision Diie-hellman Problem , 1998 .
[20] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[21] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[22] Markus Jakobsson,et al. A Practical Mix , 1998, EUROCRYPT.
[23] Markus Jakobsson,et al. Flash mixing , 1999, PODC '99.
[24] J. Markus,et al. Millimix: Mixing in Small Batches , 1999 .
[25] Masayuki Abe,et al. Mix-Networks on Permutation Networks , 1999, ASIACRYPT.
[26] Markus Jakobsson,et al. How to Forget a Secret , 1999, STACS.
[27] Masayuki Abe,et al. A Length-Invariant Hybrid Mix , 2000, ASIACRYPT.
[28] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[29] Yvo Desmedt,et al. How to Break a Practical MIX and Design a New One , 2000, EUROCRYPT.
[30] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[31] Masayuki Abe,et al. Remarks on Mix-Network Based on Permutation Networks , 2001, Public Key Cryptography.
[32] Markus Jakobsson,et al. An optimally robust hybrid mix network , 2001, PODC '01.
[33] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[34] Kazue Sako,et al. An Efficient Scheme for Proving a Shuffle , 2001, CRYPTO.
[35] Kazue Sako,et al. An Ecient Scheme for Proving a Shue , 2001 .
[36] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[37] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[38] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[39] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[40] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[41] Daniel W. Engels,et al. Radio Frequency Identification Systems , 2015 .
[42] Roger Dingledine,et al. From a Trickle to a Flood: Active Attacks on Several Mix Types , 2002, Information Hiding.
[43] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[44] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[45] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[46] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.