Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
暂无分享,去创建一个
Yehuda Lindell | Jonathan Katz | Carmit Hazay | Chiu-Yuen Koo | Jonathan Katz | Yehuda Lindell | C. Koo | Carmit Hazay
[1] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[2] Ivan Damgård,et al. Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals , 1988, CRYPTO.
[3] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[4] Adi Shamir,et al. Zero Knowledge Proofs of Knowledge in Two Rounds , 1989, CRYPTO.
[5] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[6] Michael R. Beauregard,et al. The Basic Tools , 1992 .
[7] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[8] S. D. Chatterji. Proceedings of the International Congress of Mathematicians , 1995 .
[9] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[10] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[11] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[12] Rafail Ostrovsky,et al. Security of blind digital signatures , 1997 .
[13] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[14] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[15] David Pointcheval,et al. Strengthened Security for Blind Signatures , 1998, EUROCRYPT.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[18] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[19] Masayuki Abe,et al. A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures , 2001, EUROCRYPT.
[20] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[21] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[22] Ivan Damgård,et al. Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor , 2001, CRYPTO.
[23] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[24] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[25] Amit Sahai,et al. Concurrent zero knowledge with logarithmic round-complexity , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[26] Yehuda Lindell,et al. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.
[27] Alexandra Boldyreva,et al. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme , 2003, Public Key Cryptography.
[28] Yehuda Lindell,et al. Bounded-concurrent secure two-party computation without setup assumptions , 2003, STOC '03.
[29] Chanathip Namprempre,et al. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme , 2003, Journal of Cryptology.
[30] Amit Sahai,et al. New notions of security: achieving universal composability without trusted setup , 2004, STOC '04.
[31] Yehuda Lindell,et al. Lower Bounds for Concurrent Self Composition , 2004, TCC.
[32] Jan Camenisch,et al. Efficient Blind Signatures Without Random Oracles , 2004, SCN.
[33] Ran Canetti,et al. Universally composable protocols with relaxed set-up assumptions , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[34] Aggelos Kiayias,et al. Concurrent Blind Signatures Without Random Oracles , 2006, SCN.
[35] Aggelos Kiayias,et al. Two-round concurrent blind signatures without random oracles , 2005 .
[36] Amit Sahai,et al. How to play almost any mental game over the net - concurrent composition via super-polynomial simulation , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[37] Yehuda Lindell,et al. Concurrent general composition of secure protocols in the timing model , 2005, STOC '05.
[38] Chanathip Namprempre,et al. On the (Im)possibility of Blind Message Authentication Codes , 2006, CT-RSA.
[39] Silvio Micali,et al. Input-Indistinguishable Computation , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[40] Tatsuaki Okamoto,et al. Efficient Blind and Partially Blind Signatures Without Random Oracles , 2006, IACR Cryptol. ePrint Arch..
[41] Marc Fischlin,et al. Round-Optimal Composable Blind Signatures in the Common Reference String Model , 2006, CRYPTO.