Domain-Specific Pseudonymous Signatures for the German Identity Card
暂无分享,去创建一个
Marc Fischlin | Jens Bender | Dennis Kügler | Özgür Dagdelen | Özgür Dagdelen | D. Kügler | M. Fischlin | Jens Bender
[1] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[2] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[3] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[4] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[5] Miroslaw Kutylowski,et al. Signing with multiple ID's and a single key , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[6] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[7] Marc Fischlin,et al. TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols , 2012, Sicherheit.
[8] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[9] Marc Fischlin,et al. Security Analysis of the PACE Key-Agreement Protocol , 2009, ISC.
[10] J. C. Buitelaar,et al. Anonymity in electronic government : A case-study analysis of governments' identity knowledge , 2007 .
[11] Victor K.-W. Wei. Tracing-by-Linking Group Signatures , 2005, ISC.
[12] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[13] Marc Fischlin,et al. Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents , 2010, ISC.
[14] Georg Fuchsbauer,et al. Anonymous attestation with user-controlled linkability , 2013, International Journal of Information Security.
[15] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[16] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[17] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[18] Xiaotie Deng,et al. Anonymous Signature Schemes , 2006, Public Key Cryptography.
[19] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[20] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[21] Marc Fischlin,et al. Anonymous Signatures Made Easy , 2007, Public Key Cryptography.
[22] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[23] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[24] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[25] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[26] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[27] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[28] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[29] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.