Divisible E-Cash Systems Can Be Truly Anonymous (English)
Free access
- New search for: Canard, Sébastien
- New search for: Gouget, Aline
- New search for: Canard, Sébastien
- New search for: Gouget, Aline
In:
Advances in Cryptology - EUROCRYPT 2007
;
482-497
;
2007
- Article/Chapter (Book) / Electronic Resource
-
Title:Divisible E-Cash Systems Can Be Truly Anonymous
-
Contributors:Canard, Sébastien ( author ) / Gouget, Aline ( author )
-
Published in:Advances in Cryptology - EUROCRYPT 2007 ; 482-497Lecture Notes in Computer Science ; 4515 ; 482-497
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2007-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different IdentitiesStevens, Marc / Lenstra, Arjen / Weger, Benne et al. | 2007
- 23
-
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t ExistPietrzak, Krzysztof et al. | 2007
- 34
-
The Collision Intractability of MDC-2 in the Ideal-Cipher ModelSteinberger, John P. et al. | 2007
- 52
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious AdversariesLindell, Yehuda / Pinkas, Benny et al. | 2007
- 79
-
Revisiting the Efficiency of Malicious Two-Party ComputationWoodruff, David P. et al. | 2007
- 97
-
Efficient Two-Party Secure Computation on Committed InputsJarecki, Stanisław / Shmatikov, Vitaly et al. | 2007
- 115
-
Universally Composable Multi-party Computation Using Tamper-Proof HardwareKatz, Jonathan et al. | 2007
- 129
-
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key ModelYung, Moti / Zhao, Yunlei et al. | 2007
- 148
-
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous ResettabilityDeng, Yi / Lin, Dongdai et al. | 2007
- 169
-
Conditional Computational Entropy, or Toward Separating Pseudoentropy from CompressibilityHsiao, Chun-Yuan / Lu, Chi-Jen / Reyzin, Leonid et al. | 2007
- 187
-
Zero Knowledge and Soundness Are SymmetricOng, Shien Jin / Vadhan, Salil et al. | 2007
- 210
-
Mesh SignaturesBoyen, Xavier et al. | 2007
- 228
-
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key AttacksRistenpart, Thomas / Yilek, Scott et al. | 2007
- 246
-
Batch Verification of Short SignaturesCamenisch, Jan / Hohenberger, Susan / Pedersen, Michael Østergaard et al. | 2007
- 264
-
Cryptanalysis of SFLASH with Slightly Modified ParametersDubois, Vivien / Fouque, Pierre-Alain / Stern, Jacques et al. | 2007
- 276
-
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and PypyWu, Hongjun / Preneel, Bart et al. | 2007
- 291
-
Secure Computation from Random Error Correcting CodesChen, Hao / Cramer, Ronald / Goldwasser, Shafi / Haan, Robbert / Vaikuntanathan, Vinod et al. | 2007
- 311
-
Round-Efficient Secure Computation in Point-to-Point NetworksKatz, Jonathan / Koo, Chiu-Yuen et al. | 2007
- 329
-
Atomic Secure Multi-party Multiplication with Low CommunicationCramer, Ronald / Damgård, Ivan / Haan, Robbert et al. | 2007
- 347
-
Cryptanalysis of the Sidelnikov CryptosystemMinder, Lorenz / Shokrollahi, Amin et al. | 2007
- 361
-
Toward a Rigorous Variation of Coppersmith’s Algorithm on Three VariablesBauer, Aurélie / Joux, Antoine et al. | 2007
- 379
-
An L (1/3 + ε) Algorithm for the Discrete Logarithm Problem for Low Degree CurvesEnge, Andreas / Gaudry, Pierrick et al. | 2007
- 394
-
General Ad Hoc Encryption from Exponent Inversion IBEBoyen, Xavier et al. | 2007
- 412
-
Non-interactive Proofs for Integer MultiplicationDamgård, Ivan / Thorbek, Rune et al. | 2007
- 430
-
Ate Pairing on Hyperelliptic CurvesGranger, R. / Hess, F. / Oyono, R. / Thériault, N. / Vercauteren, F. et al. | 2007
- 448
-
Ideal Multipartite Secret Sharing SchemesFarràs, Oriol / Martí-Farré, Jaume / Padró, Carles et al. | 2007
- 466
-
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-BitGeiselmann, Willi / Steinwandt, Rainer et al. | 2007
- 482
-
Divisible E-Cash Systems Can Be Truly AnonymousCanard, Sébastien / Gouget, Aline et al. | 2007
- 498
-
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext SecurityMaurer, Ueli / Sjödin, Johan et al. | 2007
- 517
-
Range Extension for Weak PRFs; The Good, the Bad, and the UglyPietrzak, Krzysztof / Sjödin, Johan et al. | 2007
- 534
-
Feistel Networks Made Public, and ApplicationsDodis, Yevgeniy / Puniya, Prashant et al. | 2007
- 555
-
Oblivious-Transfer AmplificationWullschleger, Jürg et al. | 2007
- 573
-
Simulatable Adaptive Oblivious TransferCamenisch, Jan / Neven, Gregory / shelat, abhi et al. | 2007