Information Technology Reference
In-Depth Information
3. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures
and public-key cryptosystems. Comm. ACM 21, 120-126 (1978)
4. National Institute of Standards and Technology: Secure Hash Standard (SHS).
Federal Information Processing Standard Publication 180-2 (2002)
5. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT
1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
6. Chaum, D.: Showing credentials without identification. In: Pichler, F. (ed.) EU-
ROCRYPT 1985. LNCS, vol. 219, pp. 241-244. Springer, Heidelberg (1986)
7. Ohta, K., Okamoto, T., Koyama, K.: Membership authentication for hierarchi-
cal multigroups using the extended fiat-shamir scheme. In: Damgard, I.B. (ed.)
EUROCRYPT 1990. LNCS, vol. 473, pp. 446-457. Springer, Heidelberg (1991)
8. Shizuya, H., Koyama, S., Itoh, T.: Demonstrating possession without revelating
factors and its applications. In: Seberry, J., Pieprzyk, J.P. (eds.) AUSCRYPT 1990.
LNCS, vol. 453, pp. 273-293. Springer, Heidelberg (1990)
9. Bresson, E., Stern, J.: Ecient revocation in group signature. In: Kim, K.C. (ed.)
PKC 2001. LNCS, vol. 1992, pp. 190-206. Springer, Heidelberg (2001)
10. Camenish, J., Michels, M.: Separability and eciency for generic group signa-
ture schemes (Extended abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS,
vol. 1666, pp. 413-430. Springer, Heidelberg (1999)
11. Camenish, J., Stadler, M.: Ecient group signature schemes for large groups. In:
Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer,
Heidelberg (1997)
12. Ateniese, G., Camenish, J., Joye, M., Tsudik, G.: A practical and provably secure
coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000.
LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
13. Ateniese, G., de Medeiros, B.: Ecient group signatures without trapdoors. In:
Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 246-268. Springer, Hei-
delberg (2003)
14. Nguyen, L., Safavi-Naini, R.: Ecient and provably secure trapdoor-free group
signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004.
LNCS, vol. 3329, pp. 372-386. Springer, Heidelberg (2004)
15. Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen cipher-
text attack. J. Cryptology 15(2), 75-96 (2002)
16. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.)
CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
17. Camenich, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from
bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72.
Springer, Heidelberg (2004)
18. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C.,
Camenish, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer,
Heidelberg (2004)
19. Susilo, W.: Short fail-stop signature scheme based on factorization and discrete
logarithm assumptions. Theor. Comput. Sci. 410, 736-744 (2009)
 
Search WWH ::




Custom Search