User menu

Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs

Bibliographic reference Libert, Benoît ; Yung, M.. Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.Theory of Cryptography. 7th Theory of Cryptography Conference, TCC 2010 (Zurich, Switzerland, 9-11 February 2010). In: Micciancio, D.;, Theory of Cryptography. 7th Theory of Cryptography Conference, TCC 2010, Springer-verlag2010, p. 499-517
Permanent URL http://hdl.handle.net/2078.1/67437
  1. Ateniese Giuseppe, de Medeiros Breno, Identity-Based Chameleon Hash and Applications, Financial Cryptography (2004) ISBN:9783540224204 p.164-180, 10.1007/978-3-540-27809-2_19
  2. Barreto Paulo S. L. M., Naehrig Michael, Pairing-Friendly Elliptic Curves of Prime Order, Selected Areas in Cryptography (2006) ISBN:9783540331087 p.319-331, 10.1007/11693383_22
  3. Boneh Dan, Boyen Xavier, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.223-238, 10.1007/978-3-540-24676-3_14
  4. Boneh Dan, Boyen Xavier, Goh Eu-Jin, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.440-456, 10.1007/11426639_26
  5. Boneh Dan, Gentry Craig, Waters Brent, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Advances in Cryptology – CRYPTO 2005 (2005) ISBN:9783540281146 p.258-275, 10.1007/11535218_16
  6. Camenisch Jan, Kohlweiss Markulf, Soriente Claudio, An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, Public Key Cryptography – PKC 2009 (2009) ISBN:9783642004674 p.481-500, 10.1007/978-3-642-00468-1_27
  7. Canetti Ran, Dodis Yevgeniy, Pass Rafael, Walfish Shabsi, Universally Composable Security with Global Setup, Theory of Cryptography ISBN:9783540709350 p.61-85, 10.1007/978-3-540-70936-7_4
  8. Catalano Dario, Dodis Yevgeniy, Visconti Ivan, Mercurial Commitments: Minimal Assumptions and Efficient Constructions, Theory of Cryptography (2006) ISBN:9783540327318 p.120-144, 10.1007/11681878_7
  9. Catalano Dario, Fiore Dario, Messina Mariagrazia, Zero-Knowledge Sets with Short Proofs, Advances in Cryptology – EUROCRYPT 2008 ISBN:9783540789666 p.433-450, 10.1007/978-3-540-78967-3_25
  10. Chase Melissa, Healy Alexander, Lysyanskaya Anna, Malkin Tal, Reyzin Leonid, Mercurial Commitments with Applications to Zero-Knowledge Sets, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.422-439, 10.1007/11426639_25
  11. Chaum David, Evertse Jan-Hendrik, Graaf Jeroen, An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations, Advances in Cryptology — EUROCRYPT ’87 ISBN:9783540191025 p.127-141, 10.1007/3-540-39118-5_13
  12. Cheon Jung Hee, Security Analysis of the Strong Diffie-Hellman Problem, Advances in Cryptology - EUROCRYPT 2006 (2006) ISBN:9783540345466 p.1-11, 10.1007/11761679_1
  13. Di Raimondo Mario, Gennaro Rosario, New approaches for deniable authentication, 10.1145/1102120.1102137
  14. Gennaro Rosario, Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.220-236, 10.1007/978-3-540-28628-8_14
  15. Gennaro Rosario, Micali Silvio, Independent Zero-Knowledge Sets, Automata, Languages and Programming (2006) ISBN:9783540359074 p.34-45, 10.1007/11787006_4
  16. Goldwasser Shafi, Micali Silvio, Rivest Ronald L., A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, 10.1137/0217017
  17. Hofheinz Dennis, Kiltz Eike, Programmable Hash Functions and Their Applications, Lecture Notes in Computer Science ISBN:9783540851738 p.21-38, 10.1007/978-3-540-85174-5_2
  18. Liskov Moses, Updatable Zero-Knowledge Databases, Lecture Notes in Computer Science (2005) ISBN:9783540306849 p.174-198, 10.1007/11593447_10
  19. MacKenzie Philip, Yang Ke, On Simulation-Sound Trapdoor Commitments, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.382-400, 10.1007/978-3-540-24676-3_23
  20. Merkle Ralph C., A Digital Signature Based on a Conventional Encryption Function, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.369-378, 10.1007/3-540-48184-2_32
  21. Micali S., Rabin M., Kilian J., Zero-knowledge sets, 10.1109/sfcs.2003.1238183
  22. Ostrovsky Rafail, Rackoff Charles, Smith Adam, Efficient Consistency Proofs for Generalized Queries on a Committed Database, Automata, Languages and Programming (2004) ISBN:9783540228493 p.1041-1053, 10.1007/978-3-540-27836-8_87
  23. Pedersen Torben Pryds, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology — CRYPTO ’91 ISBN:9783540551881 p.129-140, 10.1007/3-540-46766-1_9
  24. Prabhakaran Manoj, Xue Rui, Statistically Hiding Sets, Topics in Cryptology – CT-RSA 2009 (2009) ISBN:9783642008610 p.100-116, 10.1007/978-3-642-00862-7_7
  25. Waters Brent, Efficient Identity-Based Encryption Without Random Oracles, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.114-127, 10.1007/11426639_7