The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A new identification scheme based on syndrome decoding
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Designing Identification Schemes with Keys of Short Size
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A new identification scheme based on the perceptrons problem
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
On the fly signatures based on factoring
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Securely combining public-key cryptosystems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Signature Scheme Based on the Intractability of Computing Roots
Designs, Codes and Cryptography
A Secure Fault-Tolerant Conference-Key Agreement Protocol
IEEE Transactions on Computers
Efficient Electronic Cash Using Batch Signatures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A User Authentication Scheme with Identity and Location Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Formal Security Proofs for a Signature Scheme with Partial Message Recovery
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Security of Blind Discrete Log Signatures against Interactive Attacks
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Computational Alternatives to Random Number Generators
SAC '98 Proceedings of the Selected Areas in Cryptography
Abuse-Free Optimistic Contract Signing
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Forward-Secure Signatures with Optimal Signing and Verifying
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Security of 2^t-Root Identification and Signatures
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security Notions for Unconditionally Secure Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Optimal Security Proofs for PSS and Other Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient "on the Fly" Signature Schemes Based on Integer Factoring
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Fair Off-Line e-cash Made Easy
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Study on the Proposed Korean Digital Signature Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Generation of Shared RSA Keys by Two Parties
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Group Signature Scheme with Improved Efficiency
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A New Forward-Secure Digital Signature Scheme
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Round-Efficient Conference Key Agreement Protocols with Provable Security
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Provably Secure Fair Blind Signatures with Tight Revocation
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Emerging Standards for Public-Key Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Provably Secure Implicit Certificate Schemes
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
FC '99 Proceedings of the Third International Conference on Financial Cryptography
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Blind, Auditable Membership Proofs
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Undeniable Confirmer Signature
ISW '99 Proceedings of the Second International Workshop on Information Security
A New Offline Privacy Protecting E-cash System with Revokable Anonymity
ISC '02 Proceedings of the 5th International Conference on Information Security
On Quorum Controlled Asymmetric Proxy Re-encryption
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
RSA Key Generation with Verifiable Randomness
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Improving the Exact Security of Fiat-Shamir Signature Schemes
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Magic Functions: In Memoriam: Bernard M. Dwork 1923--1998
Journal of the ACM (JACM)
A privacy-protecting proxy signature scheme and its application
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
The random oracle methodology, revisited
Journal of the ACM (JACM)
Proceedings of the 11th ACM conference on Computer and communications security
Cryptographically Generated Addresses for Constrained Devices*
Wireless Personal Communications: An International Journal
Lower bounds for non-black-box zero knowledge
Journal of Computer and System Sciences - Special issue on FOCS 2003
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Information Processing Letters
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
A provably secure short signature scheme based on discrete logarithms
Information Sciences: an International Journal
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Forward-secure signatures in untrusted update environments: efficient and generic constructions
Proceedings of the 14th ACM conference on Computer and communications security
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
Simulatable Adaptive Oblivious Transfer
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A New Direct Anonymous Attestation Scheme from Bilinear Maps
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Orthogonality between Key Privacy and Data Privacy, Revisited
Information Security and Cryptology
An Efficient Strong Key-Insulated Signature Scheme and Its Application
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Design of DL-based certificateless digital signatures
Journal of Systems and Software
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Realizing Hash-and-Sign Signatures under Standard Assumptions
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Leak-free mediated group signatures
Journal of Computer Security
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
Secure peer-to-peer 3D streaming
Multimedia Tools and Applications
Privacy-Preserving Policy-Based Information Transfer
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
IEEE Transactions on Wireless Communications
Efficient and Provably Secure Self-certified Signature Scheme
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Enhancing the security of perfect blind DL-signatures
Information Sciences: an International Journal
On the security of some multi-PKG/multi-recipient signcryption schemes
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A password-authenticated key agreement scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Secure hash-and-sign signatures without the random oracle
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Optimistic fair exchange in a multi-user setting
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Self-generated-certificate public key encryption without pairing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Secret handshake with multiple groups
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A signature scheme as secure as the Diffie-Hellman problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Why provable security matters?
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Invisibility and anonymity of undeniable and confirmer signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Access control using pairing based cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Seeing through mist given a small fraction of an RSA private key
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Nominative signature from ring signature
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
New efficient certificateless signature scheme
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A practical identity-based signature scheme from bilinear map
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Boudot's range-bounded commitment scheme revisited
ICICS'07 Proceedings of the 9th international conference on Information and communications security
1-out-of-n oblivious signatures
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Computers and Electrical Engineering
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
A controllable anonymous proxy signature scheme with revocation
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
A lattice-based threshold ring signature scheme
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Choosing key sizes for cryptography
Information Security Tech. Report
Proof-of-knowledge of representation of committed value and its applications
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
An efficient blind ring signature scheme without pairings
WAIM'10 Proceedings of the 2010 international conference on Web-age information management
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Design and analysis of "flexible" k-out-of-n signatures
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Contract signature in e-commerce
Computers and Electrical Engineering
Practical remote end-to-end voting scheme
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
A new revocable secret handshake scheme with backward unlinkability
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Delegatable secret handshake scheme
Journal of Systems and Software
ProvSec'11 Proceedings of the 5th international conference on Provable security
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
Characterization of strongly secure authenticated key exchanges without NAXOS technique
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
Identity-based deterministic signature scheme without forking-lemma
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Another look at “provable security”. II
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A threshold proxy signature scheme with nonrepudiation and anonymity
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A novel ID-Based partial delegation with warrant proxy signature scheme
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Server-Aided verification: theory and practice
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient verifiable ring encryption for ad hoc groups
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Linkable ring signatures: security models and new schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Short signature scheme based on discrete logarithms
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Identity-based partial message recovery signatures (or how to shorten ID-Based signatures)
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Risk assurance for hedge funds using zero knowledge proofs
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Adaptable designated group signature
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
The ideal-cipher model, revisited: an uninstantiable blockcipher-based hash function
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
An efficient certificateless signature scheme
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A fair concurrent signature scheme based on identity
HPCA'09 Proceedings of the Second international conference on High Performance Computing and Applications
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Three-round secret handshakes based on elgamal and DSA
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
The security of the FDH variant of chaum's undeniable signature scheme
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
New signature schemes with coupons and tight reduction
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A novel and secure non-designated proxy signature scheme for mobile agents
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Group signatures: better efficiency and new theoretical aspects
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A robust multisignature scheme with applications to acknowledgement aggregation
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
An efficient CDH-based signature scheme with a tight security reduction
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
The marriage proposals problem: fair and efficient solution for two-party computations
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Auditable privacy: on tamper-evident mix networks
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Revisiting oblivious signature-based envelopes
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A method for making password-based key exchange resilient to server compromise
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Building better signcryption schemes with Tag-KEMs
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Authentication for paranoids: multi-party secret handshakes
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A practical optimal padding for signature schemes
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
A practical and tightly secure signature scheme without hash function
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Efficient, non-optimistic secure circuit evaluation based on the elgamal encryption
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Non-interactive designated verifier proofs and undeniable signatures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Verifiably encrypted signature scheme without random oracles
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
On the relation between the ideal cipher and the random oracle models
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A protocol for anonymously establishing digital provenance in reseller chains (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Anonymity and security in mobile ad hoc networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Group signature with constant revocation costs for signers and verifiers
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Efficient multiple-collision trapdoor hash family
Security and Communication Networks
Security and Communication Networks
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
On the exact security of schnorr-type signatures in the random oracle model
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Convertible ring signatures with gradual revelation of non-signers
Security and Communication Networks
Extended security arguments for signature schemes
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Practical yet universally composable two-server password-authenticated secret sharing
Proceedings of the 2012 ACM conference on Computer and communications security
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Practical Internet voting system
Journal of Network and Computer Applications
A robust and plaintext-aware variant of signed elgamal encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Limits on the usefulness of random oracles
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Provably secure certificate-based signature scheme without pairings
Information Sciences: an International Journal
Improved (and practical) public-key authentication for UHF RFID tags
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Hi-index | 0.00 |
In this paper, we address the question of providing security proofs for signature schemes in the so-called random oracle model [1]. In particular, we establish the generality of this technique against adaptively chosen message attacks. Our main application achieves such a security proof for a slight variant of the El Garrial signature schemc [4] where committed values are hashed together with the message. This is a rather surprising result since the original El Gamal is, as RSA [11], subject to existential forgery.