×

Found 83 Documents (Results 1–83)

Internet computer consensus. (English) Zbl 07824252

Milani, Alessia (ed.) et al., Proceedings of the 41st ACM symposium on principles of distributed computing, PODC ’22, Salerno, Italy, July 25–29, 2022. New York, NY: Association for Computing Machinery (ACM). 81-91 (2022).
MSC:  68M14 68W15
PDFBibTeX XMLCite
Full Text: DOI

Short threshold dynamic group signatures. (English) Zbl 1506.94075

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 401-423 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient post-quantum SNARKs for RSIS and RLWE and their applications to privacy. (English) Zbl 1501.94032

Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 247-267 (2020).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Oblivious PRF on committed vector inputs and application to deduplication of encrypted data. (English) Zbl 1460.94040

Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 337-356 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

iUC: flexible universal composability made simple. (English) Zbl 1455.94134

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 191-221 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password-authenticated public-key encryption. (English) Zbl 1458.94296

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 442-462 (2019).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. (English) Zbl 1425.68007

Lecture Notes in Computer Science 11124. Cham: Springer (ISBN 978-3-030-00433-0/pbk; 978-3-030-00434-7/ebook). xiii, 518 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

The wonderful world of global random oracles. (English) Zbl 1423.94057

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 280-312 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. (English) Zbl 1380.94004

Lecture Notes in Computer Science 10719. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). xi, 459 p. (2018).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Updatable tokenization: formal definitions and provably secure constructions. (English) Zbl 1457.94105

Kiayias, Aggelos (ed.), Financial cryptography and data security. 21st international conference, FC 2017, Sliema, Malta, April 3–7, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10322, 59-75 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous attestation with subverted TPMs. (English) Zbl 1418.94036

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10403, 427-461 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical strongly invisible and strongly accountable sanitizable signatures. (English) Zbl 1416.94041

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 437-452 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. (English) Zbl 1400.94128

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 152-182 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal composition with responsive environments. (English) Zbl 1407.94092

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 807-840 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

UC commitments for modular protocol design and applications to revocation and attribute tokens. (English) Zbl 1406.94031

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 208-239 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Virtual smart cards: how to sign with a password and a server. (English) Zbl 1478.94106

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 353-371 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Memory erasability amplification. (English) Zbl 1400.94129

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 104-125 (2016).
MSC:  94A60 68P30 94C15
PDFBibTeX XMLCite
Full Text: DOI

Formal treatment of privacy-enhancing credential systems. (English) Zbl 1339.94074

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 3-24 (2016).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Universally composable Direct Anonymous Attestation. (English) Zbl 1395.94270

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 234-264 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Composable and modular anonymous credentials: definitions and practical constructions. (English) Zbl 1375.94107

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Recovering lost device-bound credentials. (English) Zbl 1459.94094

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 307-327 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Two-server password-authenticated secret sharing UC-secure against transient corruptions. (English) Zbl 1345.94092

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 283-307 (2015).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Better zero-knowledge proofs for lattice encryption and their application to group signatures. (English) Zbl 1306.94026

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 551-572 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. (English) Zbl 1321.68009

Lecture Notes in Computer Science 8783. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). xviii, 570 p. (2014).
MSC:  68-06 68P25 00B25
PDFBibTeX XMLCite
Full Text: DOI

Memento: how to reconstruct your secrets from a single password in a hostile environment. (English) Zbl 1334.94098

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 256-275 (2014).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1326.94066

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 713-738 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical and employable protocols for UC-secure circuit evaluation over \(\mathbb Z_n\). (English) Zbl 1406.94032

Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 19-37 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer with hidden access control from attribute-based encryption. (English) Zbl 1344.94033

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 559-579 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient structure-preserving signature scheme from standard assumptions. (English) Zbl 1310.94176

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 76-94 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Fully anonymous attribute tokens from lattices. (English) Zbl 1310.94177

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 57-75 (2012).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Computing on authenticated data. (English) Zbl 1292.94017

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A framework for practical universally composable zero-knowledge protocols. (English) Zbl 1227.94036

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 449-467 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Structure preserving CCA secure encryption and applications. (English) Zbl 1227.94034

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 89-106 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer with hidden access control policies. (English) Zbl 1291.94064

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 192-209 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Solving revocation with efficient update of anonymous credentials. (English) Zbl 1291.94065

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 454-471 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Get shorty via group signatures without encryption. (English) Zbl 1291.94179

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 381-398 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Credential authenticated identification and key exchange. (English) Zbl 1280.94107

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 255-276 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms. (English) Zbl 1274.94036

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 553-571 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

iNetSec 2009 – open research problems in network security. IFIP Wg 11.4 international workshop, Zurich, Switzerland, April 23–24, 2009. Revised selected papers. (English) Zbl 1185.68023

IFIP Advances in Information and Communication Technology 309. Berlin: Springer (ISBN 978-3-642-05436-5/hbk; 978-3-642-05437-2/ebook). viii, 169 p. (2010).
MSC:  68M10 68-06
PDFBibTeX XMLCite
Full Text: DOI

Private intersection of certified sets. (English) Zbl 1196.94045

Dingledine, Roger (ed.) et al., Financial cryptography and data security. 13th international conference, FC 2009, Accra Beach, Barbados, February 23–26, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03548-7/pbk). Lecture Notes in Computer Science 5628, 108-127 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Randomizable proofs and delegatable anonymous credentials. (English) Zbl 1252.94047

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 108-125 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the portability of generalized Schnorr proofs. (English) Zbl 1239.94039

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 425-442 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. (English) Zbl 1239.94038

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 351-368 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An accumulator based on bilinear maps and efficient revocation for anonymous credentials. (English) Zbl 1227.94074

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 481-500 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. (English) Zbl 1227.94035

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 196-214 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient protocols for set membership and range proofs. (English) Zbl 1206.94057

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 234-252 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simulatable adaptive oblivious transfer. (English) Zbl 1141.94344

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 573-590 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Batch verification of short signatures. (English) Zbl 1138.94378

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 246-263 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Balancing accountability and privacy using e-cash. (Extended abstract). (English) Zbl 1152.68438

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 141-155 (2006).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact e-cash. (English) Zbl 1137.94366

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 302-321 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A formal treatment of onion routing. (English) Zbl 1145.94460

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 169-187 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient blind signatures without random oracles. (English) Zbl 1116.94311

Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 134-148 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Group signatures: better efficiency and new theoretical aspects. (English) Zbl 1116.94310

Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 120-133 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order. (English) Zbl 1081.94015

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 154-171 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signature schemes and anonymous credentials from bilinear maps. (English) Zbl 1104.94045

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 56-72 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. (English) Zbl 1051.94003

Lecture Notes in Computer Science 3027. Berlin: Springer (ISBN 3-540-21935-8/pbk). xii, 628 p. (2004).
MSC:  94-06 00B25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical verifiable encryption and decryption of discrete logarithms. (English) Zbl 1122.94357

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 126-144 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. (English) Zbl 1026.94543

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 417-432 (2002).
MSC:  94A62 11Y11
PDFBibTeX XMLCite
Full Text: Link

Dynamic accumulators and application to efficient revocation of anonymous credentials. (English) Zbl 1026.94545

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 61-76 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

An identity escrow scheme with appointed verifiers. (English) Zbl 1003.94531

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 388-407 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

An efficient system for non-transferable anonymous credentials with optional anonymity revocation. (English) Zbl 0981.94043

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 93-118 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Confirmer signature schemes secure against adaptive adversaries. (English) Zbl 1082.94537

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 243-258 (2000).
MSC:  94A62
PDFBibTeX XMLCite

A practical and provably secure coalition-resistant group signature scheme. (English) Zbl 0995.94544

Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 255-270 (2000).
MSC:  94A62
PDFBibTeX XMLCite

One-round secure computation and secure autonomous mobile agents. (Extended abstract). (English) Zbl 0973.94545

Montanari, Ugo (ed.) et al., Automata, languages and programming. 27th international colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1853, 512-523 (2000).
MSC:  94A60 68P30
PDFBibTeX XMLCite

Efficient anonymous fingerprinting with group signatures. (Extended abstract). (English) Zbl 0980.94024

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 415-428 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. (Extended abstract). (English) Zbl 0974.94010

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 331-345 (2000).
MSC:  94A60 94A62
PDFBibTeX XMLCite

Separability and efficiency for generic group signature schemes. (Extended abstract). (English) Zbl 0942.94033

Wiener, Michael (ed.), Advances in cryptology - CRYPTO ’99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1666, 413-430 (1999).
MSC:  94A62 68P25
PDFBibTeX XMLCite

Proving in zero-knowledge that a number is the product of two safe primes. (English) Zbl 0971.94009

Stern, Jacques (ed.), Advances in cryptology - EUROCRYPT ’99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2-6, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1592, 107-122 (1999).
MSC:  94A60 11Y11 11A51
PDFBibTeX XMLCite
Full Text: DOI

A group signature scheme with improved efficiency. (Extended abstract). (English) Zbl 0984.94519

Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18-22, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1514, 160-174 (1998).
MSC:  94A62 68P25
PDFBibTeX XMLCite

Efficient group signature schemes for large groups. (Extended abstract). (English) Zbl 0882.94018

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 410-424 (1997).
MSC:  94A60
PDFBibTeX XMLCite

Fair blind signatures. (English) Zbl 0973.94531

Guillou, Louis C. (ed.) et al., Advances in cryptology - EUROCRYPT ’95. International conference on the theory and application of cryptographic techniques, Saint-Malo, France, May 21-25, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 921, 209-219 (1995).
MSC:  94A62
PDFBibTeX XMLCite

Blind signatures based on the discrete logarithm problem. (English) Zbl 0885.94019

De Santis, Alfredo (ed.), Advances in cryptology - EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 950, 428-432 (1995).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software