Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes
暂无分享,去创建一个
[1] Ivan Damgård,et al. Verifiable Encryption and Applications to Group Signatures and Signature Sharing , 1998, IACR Cryptol. ePrint Arch..
[2] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[3] Amos Fiat,et al. Zero-knowledge proofs of identity , 1988, Journal of Cryptology.
[4] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[5] Jan Camenisch,et al. Separability and Efficiency for Generic Group Signature Schemes , 1999, CRYPTO.
[6] Amit Sahai,et al. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints , 1998, CRYPTO.
[7] Moti Yung,et al. Auto-Recoverable Auto-Certifiable Cryptosystems , 1998, EUROCRYPT.
[8] Holger Petersen,et al. How to Convert any Digital Signature Scheme into a Group Signature Scheme , 1997, Security Protocols Workshop.
[9] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.
[10] Rosario Gennaro,et al. New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications , 1998, J. Comput. Syst. Sci..
[11] Ivan Damgård,et al. Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? , 1997 .
[12] Jan Camenisch,et al. A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.
[13] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[14] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[15] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[16] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[17] Jacques Stern,et al. Fair Encryption of RSA Keys , 2000, EUROCRYPT.
[18] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[19] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[20] Yiannis Tsiounis,et al. "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash , 1996, ASIACRYPT.
[21] Joe Kilian,et al. Identity Escrow , 1998, CRYPTO.
[22] Ueli Maurer,et al. Digital Payment Systems With Passive Anonymity-Revoking Trustees , 1996, J. Comput. Secur..
[23] Ronald Cramer,et al. Modular Design of Secure yet Practical Cryptographic Protocols , 1997 .
[24] Giuseppe Ateniese,et al. Efficient verifiable encryption (and fair exchange) of digital signatures , 1999, CCS '99.
[25] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[26] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[27] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[28] Matthew K. Franklin,et al. Verifiable Signature Sharing , 1995, EUROCRYPT.
[29] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[30] Ivan Damgård,et al. On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs , 1989, CRYPTO.
[31] Jan Camenisch,et al. Efficient and Generalized Group Signatures , 1997, EUROCRYPT.
[32] Silvio Micali,et al. The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.
[33] Feng Bao. An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms , 1998, CARDIS.
[34] Adi Shamir,et al. How to share a secret , 1979, CACM.