New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Signature schemes based on the strong RSA assumption
ACM Transactions on Information and System Security (TISSEC)
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
Security of Blind Discrete Log Signatures against Interactive Attacks
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Efficient and Provably Secure Threshold Blind Signature
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Enabling Privacy Protection in E-commerce Applications
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
An Online, Transferable E-Cash Payment System
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Fair Off-Line e-cash Made Easy
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Provably Secure Fair Blind Signatures with Tight Revocation
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Marking: A Privacy Protecting Approach Against Blackmailing
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Journal of Complexity - Special issue on coding and cryptography
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
Anonymous traceable disclosure scheme using pairing over elliptic curve
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
Partially Blind Threshold Signature Based on RSA
Informatica
Round-Optimal Blind Signatures from Waters Signatures
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Provably Secure Untraceable Electronic Cash against Insider Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Formal to Practical Security
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Concurrently-secure blind signatures without random oracles or setup assumptions
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Linkability of some blind signature schemes
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Efficient partially blind signatures with provable security
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Equivocal blind signatures and adaptive UC-security
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Provably secure randomized blind signature scheme based on bilinear pairing
Computers & Mathematics with Applications
Post-quantum cryptography: code-based signatures
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
A new untraceable off-line electronic cash system
Electronic Commerce Research and Applications
Signatures on randomizable ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Commuting signatures and verifiable encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Two improved partially blind signature schemes from bilinear pairings
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient blind signatures without random oracles
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Difference set attacks on conjunctive keyword search schemes
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Provably secure electronic cash based on blind multisignature schemes
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Efficient provably secure restrictive partially blind signatures from bilinear pairings
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Concurrent blind signatures without random oracles
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Efficient partially blind signatures with provable security
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Oblivious conjunctive keyword search
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Efficient blind and partially blind signatures without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
Randomization enhanced Chaum's blind signature scheme
Computer Communications
Security and Communication Networks
Fair blind signatures revisited
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |