Compact E-Cash
暂无分享,去创建一个
Jan Camenisch | Anna Lysyanskaya | Susan Hohenberger | J. Camenisch | S. Hohenberger | Anna Lysyanskaya
[1] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[2] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[3] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[4] M. Rabin,et al. Randomized algorithms in number theory , 1985 .
[5] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[6] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[7] David Chaum,et al. Online Cash Checks , 1990, EUROCRYPT.
[8] Kazuo Ohta,et al. Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash , 1989, CRYPTO.
[9] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[10] David Chaum,et al. Transferred Cash Grows in Size , 1992, EUROCRYPT.
[11] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[12] Stefan BrandsCWI,et al. Untraceable Oo-line Cash in Wallets with Observers , 1993 .
[13] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[14] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[15] Ronald Cramer,et al. The ESPRIT Project CAFE - High Security Digital Payment Systems , 1994, ESORICS.
[16] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[17] Ernest F. Brickell,et al. Trustee-based tracing extensions to anonymous cash and the making of anonymous change , 1995, SODA '95.
[18] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[19] Tatsuaki Okamoto,et al. An Efficient Divisible Electronic Cash Scheme , 1995, CRYPTO.
[20] Yiannis Tsiounis,et al. Mis-representation of Identities in E-cash Schemes and how to Prevent it , 1996, ASIACRYPT.
[21] Osamu Yamashita,et al. An Improvement of the Digital Cash Protocol of Okamoto and Ohta , 1996, ISAAC.
[22] Yiannis Tsiounis,et al. "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash , 1996, ASIACRYPT.
[23] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[24] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[25] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[26] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[27] Stefan Brands,et al. Rapid Demonstration of Linear Relations Connected by Boolean Operators , 1997, EUROCRYPT.
[28] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[29] Yiannis Tsiounis,et al. Efficient Electronic Cash: New Notions and Techniques , 1997 .
[30] Jan Camenisch,et al. Group signature schemes and payment systems based on the discrete logarithm problem , 1998 .
[31] Yiannis Tsiounis,et al. Easy Come - Easy Go Divisible Cash , 1998, EUROCRYPT.
[32] Jan Camenisch,et al. Separability and Efficiency for Generic Group Signature Schemes , 1999, CRYPTO.
[33] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[34] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[35] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[36] Ivan Damgård,et al. Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.
[37] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[38] Steven D. Galbraith,et al. Supersingular Curves in Cryptography , 2001, ASIACRYPT.
[39] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[40] Ivan Damgård,et al. An Integer Commitment Scheme based on Groups with Hidden Order , 2001, IACR Cryptol. ePrint Arch..
[41] Mike Scott,et al. Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number , 2002, IACR Cryptol. ePrint Arch..
[42] Mihir Bellare,et al. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.
[43] Yevgeniy Dodis,et al. Efficient Construction of (Distributed) Verifiable Random Functions , 2003, Public Key Cryptography.
[44] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[45] Ivan Damgård,et al. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order , 2002, ASIACRYPT.
[46] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[47] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[48] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[49] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[50] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[51] Jan Camenisch,et al. Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.
[52] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[53] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[54] Vitaly Shmatikov,et al. Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme , 2004, EUROCRYPT.
[55] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[56] Steven D. Galbraith,et al. Easy decision-Diffie-Hellman groups , 2004, IACR Cryptol. ePrint Arch..
[57] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[58] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[59] Paulo S. L. M. Barreto,et al. A New Two-Party Identity-Based Authenticated Key Agreement , 2005, CT-RSA.
[60] Mårten Trolin. A Universally Composable Scheme for Electronic Cash , 2005, INDOCRYPT.
[61] Jasmy Yunus,et al. Estimations on the security aspect of Brands' electronic cash scheme , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[62] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[63] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.