A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
暂无分享,去创建一个
[1] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[2] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] A. Shamir,et al. Improved On-line / Off-line Signature Schemes , 2022 .
[5] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[6] Rosario Gennaro,et al. Paillier's cryptosystem revisited , 2001, CCS '01.
[7] Gary L. Miller. Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..
[8] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[9] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[10] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[11] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[12] David Pointcheval,et al. REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Antoine Joux,et al. Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups , 2001, IACR Cryptology ePrint Archive.
[15] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[16] Joan Boyar,et al. A discrete logarithm implementation of perfect zero-knowledge blobs , 1990, Journal of Cryptology.
[17] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[18] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[19] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..
[20] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[21] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[22] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[23] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..