Credential Authenticated Identification and Key Exchange
暂无分享,去创建一个
Jan Camenisch | Thomas Gross | Victor Shoup | Nathalie Casati | V. Shoup | J. Camenisch | N. Casati | Thomas Gross
[1] Donald Beaver,et al. Cryptographic Protocols Provably Secure Against Dynamic Adversaries , 1992, EUROCRYPT.
[2] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[3] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[4] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[5] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[6] Stanislaw Jarecki,et al. Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures , 2000, EUROCRYPT.
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[9] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[10] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[11] Ke Yang,et al. On Simulation-Sound Trapdoor Commitments , 2004, EUROCRYPT.
[12] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[13] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[14] Yehuda Lindell,et al. Universally Composable Password-Based Key Exchange , 2005, EUROCRYPT.
[15] Craig Gentry,et al. A Method for Making Password-Based Key Exchange Resilient to Server Compromise , 2006, CRYPTO.
[16] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[17] Gene Tsudik,et al. Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange , 2008, CT-RSA.
[18] David Pointcheval,et al. Smooth Projective Hashing for Conditionally Extractable Commitments , 2009, CRYPTO.
[19] Eike Kiltz,et al. The Group of Signed Quadratic Residues and Applications , 2009, CRYPTO.
[20] Yehuda Lindell,et al. Secure Computation Without Authentication , 2005, Journal of Cryptology.
[21] Jan Camenisch,et al. Credential-Authenticated Identification and Key Exchange (Extended Version) , 2010 .