Anonymous Identification in Ad Hoc Groups
暂无分享,去创建一个
Aggelos Kiayias | Yevgeniy Dodis | Victor Shoup | Antonio Nicolosi | A. Kiayias | V. Shoup | Antonio Nicolosi | Y. Dodis
[1] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[2] Giovanni Di Crescenzo,et al. On monotone formula closure of SZK , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[3] Adi Shamir,et al. Zero Knowledge Proofs of Knowledge in Two Rounds , 1989, CRYPTO.
[4] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[5] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[6] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[7] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[8] Jan Camenisch,et al. A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.
[9] Gene Tsudik,et al. Some Open Issues and New Directions in Group Signatures , 1999, Financial Cryptography.
[10] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[11] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[12] Aggelos Kiayias,et al. Extracting Group Signatures from Traitor Tracing Schemes , 2003, EUROCRYPT.
[13] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[14] Ronald Cramer,et al. Modular Design of Secure yet Practical Cryptographic Protocols , 1997 .
[15] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[16] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[17] Matthew K. Franklin,et al. Anonymous authentication with subset queries (extended abstract) , 1999, CCS '99.
[18] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[19] Jacques Stern,et al. Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.
[20] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[21] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[22] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[23] Jan Camenisch,et al. An Identity Escrow Scheme with Appointed Verifiers , 2001, CRYPTO.
[24] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[25] Moni Naor,et al. Deniable Ring Authentication , 2002, CRYPTO.
[26] Giovanni Di Crescenzo,et al. Communication-efficient anonymous group identification , 1998, CCS '98.
[27] Giuseppe Ateniese,et al. Efficient Group Signatures without Trapdoors , 2003, ASIACRYPT.
[28] Jan Camenisch,et al. Efficient and Generalized Group Signatures , 1997, EUROCRYPT.
[29] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[30] Marc Fischlin,et al. Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.
[31] Shouhuai Xu,et al. Accumulating Composites and Improved Group Signing , 2003, ASIACRYPT.
[32] Joe Kilian,et al. Identity Escrow , 1998, CRYPTO.
[33] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[34] Lidong Chen,et al. New Group Signature Schemes (Extended Abstract) , 1994, EUROCRYPT.
[35] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[36] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[37] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[38] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.