Structure-Preserving Signatures and Commitments to Group Elements, Crypto'10, pp.209-236, 2010. ,
An Efficient Anonymous Credential System, FC '08, pp.272-286, 2008. ,
DOI : 10.1007/978-3-540-85230-8_25
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Crypto'00, pp.255-270, 2000. ,
DOI : 10.1007/3-540-44598-6_16
Constant-Size Dynamic k-TAA, SNC '06, pp.111-125, 2006. ,
DOI : 10.1007/11832072_8
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees, Eurocrypt'97, pp.480-494, 1997. ,
P-signatures and non-interactive anonymous credentials, TCC'08, pp.356-374, 2008. ,
DOI : 10.1007/978-3-540-78524-8_20
URL : https://lirias.kuleuven.be/bitstream/123456789/228640/2/article-1004.pdf
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security, IEEE Transactions on Information Theory, vol.53, issue.11, pp.3927-3943, 2007. ,
DOI : 10.1109/TIT.2007.907471
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, Eurocrypt'03, pp.614-629, 2003. ,
DOI : 10.1007/3-540-39200-9_38
Multi-signatures in the plain public-Key model and a general forking lemma, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.390-399, 2006. ,
DOI : 10.1145/1180405.1180453
Foundations of group signatures: The case of dynamic groups Get Shorty via Group Signatures without Encryption, CT-RSA'05 SCN'10, pp.136-153, 2005. ,
Short Signatures Without Random Oracles, Eurocrypt'04, pp.56-73, 2004. ,
DOI : 10.1007/978-3-540-24676-3_4
Short Group Signatures, Crypto'04, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Oblivious transfer with access control, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.131-140, 2009. ,
DOI : 10.1145/1653662.1653679
Compact E-Cash, Eurocrypt'05, pp.302-321, 2005. ,
DOI : 10.1007/11426639_18
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Eurocrypt'01, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
A Signature Scheme with Efficient Protocols, SCN'04, pp.268-289, 2002. ,
DOI : 10.1007/3-540-36413-7_20
Signature Schemes and Anonymous Credentials from Bilinear Maps, Crypto'04, pp.56-72, 2004. ,
DOI : 10.1007/978-3-540-28628-8_4
Private Intersection of Certified Sets, FC '09, pp.108-127, 2009. ,
DOI : 10.1007/978-3-642-03549-4_7
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
Group Signatures, Eurocrypt'91, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Modular Design of Secure, yet Practical Cryptographic Protocols, 1996. ,
Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions, PKC'00, pp.354-372, 2000. ,
DOI : 10.1007/978-3-540-46588-1_24
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Crypto'98, pp.13-25, 1994. ,
DOI : 10.1007/BFb0055717
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model, Eurocrypt'00, pp.418-430, 2000. ,
DOI : 10.1007/3-540-45539-6_30
Dynamic Fully Anonymous Short Group Signatures, Vietcrypt'06, pp.193-210, 2006. ,
DOI : 10.1007/11958239_13
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Crypto'86, pp.186-194, 2003. ,
DOI : 10.1007/3-540-47721-7_12
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups, Eurocrypt'10, pp.44-61, 2010. ,
DOI : 10.1007/978-3-642-13190-5_3
Strengthening Zero-Knowledge Protocols Using Signatures, Eurocrypt'03, pp.177-194, 2003. ,
Fully Anonymous Group Signatures Without Random Oracles, Asiacrypt'07, pp.164-180, 2007. ,
DOI : 10.1007/978-3-540-76900-2_10
Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt'08, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Dual Form Signatures: An Approach for Proving Security from Static Assumptions, Asiacrypt'12, pp.25-42, 2012. ,
DOI : 10.1007/978-3-642-34961-4_4
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces, Asiacrypt '13, pp.1-20, 2013. ,
DOI : 10.1007/s00145-016-9243-7
Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces, Crypto'14, pp.295-312, 2014. ,
DOI : 10.1007/978-3-662-44381-1_17
Secure scalable group signature with dynamic joins and separable authorities, International Journal of Security and Networks, vol.1, issue.1/2, pp.24-45, 2006. ,
DOI : 10.1504/IJSN.2006.010821
Efficiency improvements for signature schemes with tight security reductions, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.155-164, 2003. ,
DOI : 10.1145/948109.948132
Quasi-Adaptive NIZK for Linear Subspaces, pp.101-128, 2015. ,
DOI : 10.1007/978-3-662-46803-6_4
URL : https://hal.archives-ouvertes.fr/hal-01220192
Linearly Homomorphic Structure-Preserving Signatures and Their Applications, Crypto'13, pp.289-307, 2013. ,
DOI : 10.1007/s10623-015-0079-1
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, Eurocrypt'14, pp.514-532, 2014. ,
DOI : 10.1007/978-3-642-55220-5_29
URL : https://hal.archives-ouvertes.fr/hal-00983147
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions, Crypto'15, pp.296-316, 2015. ,
DOI : 10.1007/978-3-662-48000-7_15
URL : https://hal.archives-ouvertes.fr/hal-01225353
Pseudonym Systems, SAC'99, pp.184-199, 2000. ,
DOI : 10.1007/3-540-46513-8_14
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying, PKC '09, pp.463-480, 2009. ,
Number-theoretic constructions of efficient pseudo-random functions, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.458-467, 1997. ,
DOI : 10.1109/SFCS.1997.646134
Efficient Blind and Partially Blind Signatures Without Random Oracles, TCC '06, pp.80-99, 2006. ,
DOI : 10.1007/11681878_5
Short Randomizable Signatures. To appear in CT-RSA'16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01377997
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000. ,
DOI : 10.1007/s001450010003
Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Eurocrypt'98, pp.1-16, 1998. ,
Exponent-inversion Signatures and IBE under Static Assumptions, Cryptology ePrint Archive, vol.2014 ,