Signing on elements in bilinear groups for modular protocol design. Cryptology ePrint Archive, 2010. ,
Structure-preserving signatures and commitments to group elements, CRYPTO '10, 2010. ,
DOI : 10.1007/978-3-642-14623-7_12
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions, Asiacrypt'12, pp.4-24, 2012. ,
DOI : 10.1007/978-3-642-34961-4_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.4450
Tagged One-Time Signatures: Tight Security and Optimal Tag Size, PKC '13, 2013. ,
DOI : 10.1007/978-3-642-36362-7_20
Computing on authenticated data, TCC '12, 2012. ,
Computing on Authenticated Data: New Privacy Definitions and Constructions, ASIACRYPT '12, 2012. ,
DOI : 10.1007/978-3-642-34961-4_23
URL : https://hal.archives-ouvertes.fr/hal-00730665
Realizing fully secure unrestricted ID-based ring signature in the standard model from HIBE, IEEE Trans. Information Forensics and Security, vol.8, issue.12, 2013. ,
HIFS, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516724
Randomizable Proofs and Delegatable Anonymous Credentials, CRYPTO '09, 2009. ,
DOI : 10.1007/978-3-642-03356-8_7
Security proofs for identity-based identification and signature schemes, Preliminary version in EUROCRYPT '04, 2004. ,
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993. ,
DOI : 10.1145/168588.168596
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin, EUROCRYPT '96, 1996. ,
DOI : 10.1007/3-540-68339-9_34
Ring signatures: Stronger definitions, and constructions without random oracles, Extended abstract in TCC '06, 2006. ,
DOI : 10.2139/ssrn.1156505
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.749
Cryptographic methods for storing ballots on a voting machine, NDSS '07, 2007. ,
Hierarchical Identity Based Encryption with Constant Size Ciphertext, EU- ROCRYPT '05, 2005. ,
DOI : 10.1007/11426639_26
Short Group Signatures, CRYPTO '04, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Identity-based encryption from the Weil pairing, Earlier version in CRYPTO '01, 2001. ,
Generalized Identity Based and Broadcast Encryption Schemes, ASIACRYPT '08, 2008. ,
DOI : 10.1007/3-540-36178-2_33
Short signatures from the Weil pairing, ASIACRYPT '01, 2001. ,
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT '03, 2003. ,
DOI : 10.1007/3-540-39200-9_26
The random oracle methodology, revisited, STOC '98, 1998. ,
DOI : 10.1145/1008731.1008734
Ring Signatures of Sub-linear Size Without Random Oracles, ICALP '07, 2007. ,
DOI : 10.1007/978-3-540-73420-8_38
Malleable Proof Systems and Applications, EURO- CRYPT '12, 2012. ,
DOI : 10.1007/978-3-642-29011-4_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.7214
Computer security by redefining what a computer is, Proceedings on the 1992-1993 workshop on New security paradigms , NSPW '92-93, 1993. ,
DOI : 10.1145/283751.283834
Programmable Hash Functions in the Multilinear Setting, CRYPTO '13, 2013. ,
DOI : 10.1007/978-3-642-40041-4_28
On the Generic Construction of Identity-Based Signatures with Additional Properties, ASIACRYPT '06, 2006. ,
DOI : 10.1007/11935230_12
Candidate Multilinear Maps from Ideal Lattices, EUROCRYPT '13, 2013. ,
DOI : 10.1007/978-3-642-38348-9_1
Candidate indistinguishability obfuscation and functional encryption for all circuits, FOCS '13, 2013. ,
Dual Form Signatures: An Approach for Proving Security from Static Assumptions, ASIACRYPT '12, 2012. ,
DOI : 10.1007/978-3-642-34961-4_4
Hierarchical ID-Based Cryptography, ASIACRYPT '02, 2002. ,
DOI : 10.1007/3-540-36178-2_34
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures, ASI- ACRYPT '06, 2006. ,
DOI : 10.1007/11935230_29
Efficient Non-interactive Proof Systems for Bilinear Groups, EUROCRYPT '08, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Programmable hash functions and their applications, CRYPTO '08, 2008. ,
DOI : 10.1007/s00145-011-9102-5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7292
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures, CRYPTO '13, 2013. ,
DOI : 10.1007/978-3-642-40041-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6165
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation, EUROCRYPT '14, 2014. ,
DOI : 10.1007/978-3-642-55220-5_12
Homomorphic Signature Schemes, CT-RSA '02, 2002. ,
DOI : 10.1007/3-540-45760-7_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.1944
Append-Only Signatures, ICALP '05, 2005. ,
DOI : 10.1007/11523468_36
Unbounded HIBE and Attribute-Based Encryption, EUROCRYPT '11, 2011. ,
DOI : 10.1007/978-3-642-20465-4_30
Sequential Aggregate Signatures and Multisignatures Without Random Oracles, EUROCRYPT '06, 2006. ,
DOI : 10.1007/11761679_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.7086
Oblivious data structures, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, 1997. ,
DOI : 10.1145/258533.258638
Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.39
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories, ICALP '07, 2007. ,
DOI : 10.1007/978-3-540-73420-8_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.5537
Anti-persistence: History independent data structures, STOC '01, 2001. ,
How to Leak a Secret, ASIACRYPT '01, 2001. ,
DOI : 10.1007/3-540-45682-1_32
Efficient Ring Signatures Without Random Oracles, PKC '07, 2007. ,
DOI : 10.1007/978-3-540-71677-8_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.6664
Identity-Based Cryptosystems and Signature Schemes, CRYPTO '84, 1984. ,
DOI : 10.1007/3-540-39568-7_5
Efficient Identity-Based Encryption Without Random Oracles, EUROCRYPT '05, 2005. ,
DOI : 10.1007/11426639_7
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, CRYPTO '09, 2009. ,
DOI : 10.1007/978-3-642-03356-8_36