Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
暂无分享,去创建一个
[1] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[2] Oded Goldreich,et al. Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem , 1997, Electron. Colloquium Comput. Complex..
[3] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[4] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[5] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[6] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[7] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[8] Jonathan Katz,et al. Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications , 2003, EUROCRYPT.
[9] Silvio Micali,et al. More on Proofs of Knowledge , 1998, IACR Cryptol. ePrint Arch..
[10] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[11] Jacques Stern,et al. Cryptanalysis of the Ajtai-Dwork Cryptosystem , 1998, CRYPTO.
[12] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[13] Ivan Damgård,et al. Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.
[14] Bruce Schneier,et al. Reaction Attacks against several Public-Key Cryptosystems , 1999, ICICS.
[15] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[16] Daniele Micciancio,et al. Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More , 2003, CRYPTO.
[17] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[18] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[19] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[20] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[21] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[22] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[23] Vijay Varadharajan,et al. Information and Communication Security , 1999, Lecture Notes in Computer Science.
[24] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[25] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[26] Moti Yung,et al. Symmetric Public-Key Encryption , 1985, CRYPTO.
[27] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[28] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[29] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[30] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[31] Moti Yung,et al. Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation , 1996, Journal of Cryptology.
[32] Oded Goldreich,et al. On the Limits of Nonapproximability of Lattice Problems , 2000, J. Comput. Syst. Sci..
[33] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[34] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[35] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.