Deniable Ring Authentication Revisited
暂无分享,去创建一个
Yi Mu | Willy Susilo | Y. Mu | W. Susilo
[1] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[2] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[3] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[4] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[5] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[6] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[7] Moni Naor,et al. Concurrent zero-knowledge , 1998, STOC '98.
[8] Rosario Gennaro,et al. Paillier's cryptosystem revisited , 2001, CCS '01.
[9] Yi Mu,et al. Non-interactive Deniable Ring Authentication , 2003, ICISC.
[10] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Moni Naor,et al. Deniable Ring Authentication , 2002, CRYPTO.
[13] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.