Accountable Ring Signatures: A Smart Card Approach
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[2] Moni Naor,et al. Distributed Pseudo-random Functions and KDCs , 1999, EUROCRYPT.
[3] Shouhuai Xu,et al. Accumulating Composites and Improved Group Signing , 2003, ASIACRYPT.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[6] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[8] Jan Camenisch,et al. Efficient and Generalized Group Signatures , 1997, EUROCRYPT.
[9] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[10] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[11] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[12] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[13] Moti Yung,et al. Kleptography: Using Cryptography Against Cryptography , 1997, EUROCRYPT.
[14] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[15] J. Camenisch,et al. A Group Signature Scheme Based on an RSA-Variant , 1998 .
[16] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[17] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[18] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[19] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Jean-Sébastien Coron,et al. Universal Padding Schemes for RSA , 2002, CRYPTO.
[22] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[23] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[24] Giovanni Di Crescenzo,et al. On monotone formula closure of SZK , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[25] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[26] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[27] Yvo Desmedt,et al. Simmons' protocol is not free of subliminal channels , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[28] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[29] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[30] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[31] Sébastien Canard,et al. Implementing Group Signature Schemes with Smart Cards , 2002, CARDIS.