Anonymous Signature Schemes
暂无分享,去创建一个
[1] Xiaotie Deng,et al. Efficient Anonymous Roaming and Its Security Analysis , 2005, ACNS.
[2] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[3] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[4] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[5] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[6] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[7] Mihir Bellare,et al. Key-Privacy in Public-Key Encryption , 2001, ASIACRYPT.
[8] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[9] Els Van Herreweghen. Secure Anonymous Signature-Based Transactions , 2000, ESORICS.
[10] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[11] Mihir Bellare,et al. iKP - A Family of Secure Electronic Payment Protocols , 1995, USENIX Workshop on Electronic Commerce.
[12] Xiaotie Deng,et al. Analysis and Improvement of a Signcryption Scheme with Key Privacy , 2005, ISC.
[13] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[14] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[15] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[16] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[17] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[18] Byoungcheon Lee,et al. Efficient Public Auction with One-Time Registration and Public Verifiability , 2001, INDOCRYPT.
[19] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[22] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[23] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[24] Colin Boyd,et al. Public key protocols for wireless communications , 1998, ICISC.