Security of Blind Digital Signatures (Extended Abstract)
暂无分享,去创建一个
[1] C. Dwork,et al. An Eecient Existentially Unforgeable Signature Scheme and Its Applications , 1994 .
[2] Silvio Micali,et al. How To Sign Given Any Trapdoor Function , 1988, CRYPTO.
[3] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[6] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[7] Claus-Peter Schnorr. E cient Identi cation and Signatures for Smart-Cards , 1990, CRYPTO 1990.
[8] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[9] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] S. Brands. Oo-line Electronic Cash Based on Secret-key Certiicates , 1995 .
[12] Rafail Ostrovsky,et al. Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) , 1992, CRYPTO.
[13] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[14] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[15] Mihir Bellare,et al. New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs , 1989, CRYPTO.
[16] Stefan Brands. Off-Line Electronic Cash Based on Secret-Key Certificates , 1995, LATIN.
[17] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[18] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[19] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[20] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[21] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[22] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[23] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[24] Moni Naor,et al. An Efficient Existentially Unforgeable Signature Scheme and its Applications , 1994, CRYPTO.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[27] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[28] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[29] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.