Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
暂无分享,去创建一个
Jonathan Katz | Adam Bender | Ruggero Morselli | Jonathan Katz | R. Morselli | Adam Bender | Ruggero Morselli
[1] R. Rivest,et al. Ad-Hoc-Group Signatures from Hijacked Keypairs , 2005 .
[2] Kenneth G. Paterson,et al. Concurrent Signatures , 2004, EUROCRYPT.
[3] Mihir Bellare,et al. Foundations of group signatures: Formal de ni-tions , 2003 .
[4] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[5] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[6] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[7] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[8] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[9] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[10] Moni Naor,et al. Zaps and Their Applications , 2007, SIAM J. Comput..
[11] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[12] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[13] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.
[14] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[16] Germán Sáez,et al. Forking Lemmas for Ring Signature Schemes , 2003, INDOCRYPT.
[17] Wenyin Liu,et al. Advances in Web-Based Learning – ICWL 2004 , 2004, Lecture Notes in Computer Science.
[18] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[19] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[20] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, Annual International Cryptology Conference.
[21] Dengguo Feng,et al. A Ring Signature Scheme Using Bilinear Pairings , 2004, WISA.
[22] Aggelos Kiayias,et al. Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.
[23] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[24] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[25] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[26] Moni Naor,et al. Deniable Ring Authentication , 2002, CRYPTO.
[27] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[28] Javier Herranz Sotoca,et al. Some digital signature schemes with collective signers , 2005 .