An Identity-Based Group Signature with Membership Revocation in the Standard Model
暂无分享,去创建一个
[1] Jan Camenisch,et al. Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.
[2] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[3] Jan Camenisch,et al. Efficient and Generalized Group Signatures , 1997, EUROCRYPT.
[4] Nobuo Funabiki,et al. Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps , 2005, ASIACRYPT.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Aggelos Kiayias,et al. Group Signatures with Efficient Concurrent Join , 2005, EUROCRYPT.
[7] Dawn Xiaodong Song,et al. Practical forward secure group signature schemes , 2001, CCS '01.
[8] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[9] Dawn Song,et al. Quasi-Efficient Revocation of Group Signatures , 2003 .
[10] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[11] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[12] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[13] Marc Fischlin,et al. Unlinkability of Sanitizable Signatures , 2010, Public Key Cryptography.
[14] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[15] Brent Waters,et al. Compact Group Signatures Without Random Oracles , 2006, EUROCRYPT.
[16] Jens Groth,et al. Fully Anonymous Group Signatures without Random Oracles , 2007, IACR Cryptol. ePrint Arch..
[17] Brent Waters,et al. Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.
[18] Bogdan Warinschi,et al. Identity Based Group Signatures from Hierarchical Identity-Based Encryption , 2009, Pairing.
[19] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[20] Benoît Libert,et al. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model , 2009, CANS.
[21] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.