Next: About this document ...
Up: Implementing Group Signature Schemes
Previous: Acknowledgments
- 1
- G. Ateniese, J. Camenisch, M. Joye, G. Tsudik. A Practical
and Provably Secure Coalition-Resistant Group Signature Scheme. In
L. Bellare, editor, Advances in Cryptology-Crypto'2000, volume
1880 of LNCS, pages 255-270. Springer-Verlag, 2000.
- 2
- G. Ateniese, D. Song and G. Tsudik. Quasi-Efficient
Revocation of Group Signatures. In Financial Cryptography 2002,
Southampton, Bermuda, March 11-14, 2002.
- 3
- N. Baric, B. Pfitzmann. Collision-Free
Accumulators and Fail-Stop Signature Schemes Without Trees. In W.
Fumy editor, Advances in Cryptology-Eurocrypt'97, volume 1233 of
LNCS, pages 480-484. Springer-Verlag, 1997.
- 4
- E. Bresson, J. Stern. Efficient Revocation in
Group Signatures. In K. Kim, editor, Public Key
Cryptography-PKC2001, volume 1992 of LNCS, pages 190-206.
Springer-Verlag, 2001.
- 5
- J. Camenisch, A. Lysyanskaya. Efficient Revocation
of Anonymous Group Membership Certificates and Anonymous
Credentials. Crypto'2002, to appear.
- 6
- J. Camenisch, M. Michels. A Group Signature Scheme based on an
RSA-variant. Technical Report RS-98-27, BRICS, Dept. of Comp.
Sci., University of Arhus, preliminary version in Advances in
Cryptology-EUROCRYPT'98, volume 1514 of LNCS.
- 7
- J. Camenisch, M. Stadler. Efficient Group Signature Schemes
for Large Groups. In B. Kaliski, editor, Advances in
Cryptology-CRYPTO'97, volume 1296 of LNCS, pages 410-424.
Springer-Verlag, 1997.
- 8
- D. Chaum, E. van Heyst. Group Signatures. In D. W. Davies,
editor, Advances in Cryptology-Eurocrypt'91, volume 547 of LNCS,
pages 257-265. Springer-Verlag, 1991.
- 9
- E. Fujisaki, T. Okamoto. Statistical Zero-Knowledge
Protocols Solution to Identification and Signature Problems. In
A.M. Odlyzko, editor, Advances in Cryptology-Crypto'97, volume
1294 of LNCS, pages 16-30. Springer-Verlag, 1997.
- 10
- M. Girault. Self-Certified Public Keys. In D.W. Davies,
editor, Advances in Cryptology-Eurocrypt'91, volume 547 of LNCS,
pages 490-497. Springer-Verlag, 1991.
- 11
- D. E. Knuth. The Art of Computer Programming, Volume 3 /
Sorting and Searching. Addisson-Wesley Publishing Compagny. pages
559-563. 1973.
- 12
- K.Q. Nguyen, J. Traoré. An Online Public Auction Protocol
Protecting Bidder Privacy. Information Security and Privacy, 5th
Australasian Conference-ACISP 2000, pages 427-442.
Springer-Verlag, 2000.
- 13
- G. Poupard, J. Stern. A Practical and Provably
Secure Design for ``on the Fly'' Authentication and Signature
Generation. In K. Nyberg, editor, Advances in
Cryptology-Eurocrypt'98, volume 1403 of LNCS, pages 422-436.
Springer-Verlag, 1998.
- 14
- D. Song. Practical Forward Secure Group Signature Schemes.
ACM on Computer and Communications Security. 2001.
- 15
- J. Traoré. Group Signatures and Their Relevance to
Privacy-Protecting Off-Line Electronic Cash Systems. In J.
Pieprzyk, R. Safavi-Naini, J. Seberry, editors, Information
Security and Privacy, 4th Australasian Conference-ACISP'99, volume
1587 of LNCS, pages 228-243. Springer-Verlag, 1999.
- 16
- C. K. Wong, M. G. Gouda, S. S. Lam. Secure Group
Communications Using Key Graph. Technical Report TR-97-23, July
28, 1997, revised version in IEEE/ACM Transactions on Networking,
Feb 2000.