1 |
David Chaum, "Security Without Identification: Transaction Systems to Make Big Brother Obsolete," Communications of the ACM, Vol. 28, No. 10, 1985, pp. 1030-1044.
DOI
ScienceOn
|
2 |
M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko, "The One-More-RSA-Inversion Problems and the Security of Chaun's Blind Signatures Signatures," Journal of Cryptology, June 2003, pp. 185-215.
|
3 |
David Chaum, E. V. Heyst, "Group Signatures," Advanced in Cryptology-Eurocrypt 1991, LNCS 547, pp. 257-265.
|
4 |
Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Tsudik, "A Pratical and Probably Secure Coalition-resistant Group Signature Scheme," CRYPTO 2000, 2000.
|
5 |
G. Ateniese, G. Tsudik, and D. Song, "Quasiefficient Revocation of Group Signatures," Proc of Financial Cryptography 2002, Mar. 2002.
|
6 |
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Definition, Simplified Requirements and a Construction Based on General Assumptions," CRYPTO 2004, 2004.
|
7 |
D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," CRYPTO 2004, LNCS 3152, 2004, pp. 41-55.
|
8 |
Dan Boneh and Hovav Shacham, "Group Signatures with Verifier-Local Revocation," CCS 2004, pp. 168-177.
|
9 |
Ron Rivest, Adi Shamir, and Yael Tauman, "How to Leak a Secret: Theory and Applications of Ring Signatures," ASIACRYPT 2001, 2001.
|
10 |
Aggelos Kiayaias, Yiannis Tsiounis, and Moti Yung, "Traceable Signatures," EUROCRYPT 2004, 2004.
|
11 |
A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable Signatures,"Eurocrypt 2004, LNCS 3027, 2004, pp. 571-589.
|