Revocation for Delegatable Anonymous Credentials, PKC'11, pp.423-440, 2011. ,
DOI : 10.1007/978-3-642-19379-8_26
Compact E-Cash from Bounded Accumulator, CT-RSA 2007, pp.178-195, 2007. ,
DOI : 10.1007/11967668_12
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees, EUROCRYPT 1997, pp.480-494, 1997. ,
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening, Eurocrypt'09, pp.1-35, 2009. ,
DOI : 10.1007/978-3-540-70936-7_23
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Eurocrypt'93, pp.274-285, 1993. ,
DOI : 10.1007/3-540-48285-7_24
Verifiable Delegation of Computation over Large Datasets, Crypto 2011, pp.111-131, 2011. ,
DOI : 10.1007/978-3-642-22792-9_7
Coin Flipping by Telephone, Crypto'81, pp.11-15, 1981. ,
Non-interactive zero-knowledge and its applications, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.103-112, 1988. ,
DOI : 10.1145/62212.62222
Short Signatures Without Random Oracles, Eurocrypt'04, pp.56-73, 2004. ,
DOI : 10.1007/978-3-540-24676-3_4
Bivariate Polynomials Modulo Composites and Their Applications, ASIACRYPT 2014, Part I, pp.42-62, 2014. ,
DOI : 10.1007/978-3-662-45611-8_3
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
Functional Encryption: Definitions and Challenges, TCC'11, pp.253-273, 2011. ,
DOI : 10.1007/978-3-642-19571-6_16
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, PKC'09, pp.481-500, 2009. ,
DOI : 10.1007/978-3-642-00468-1_27
Solving Revocation with Efficient Update of Anonymous Credentials, SCN'10, pp.454-471, 2010. ,
DOI : 10.1007/978-3-642-15317-4_28
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions, Asiacrypt'15, pp.262-288, 2015. ,
DOI : 10.1007/978-3-662-48800-3_11
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, Crypto'02, pp.61-76, 2002. ,
DOI : 10.1007/3-540-45708-9_5
Vector Commitments and Their Applications, PKC 2013, pp.55-72, 2013. ,
DOI : 10.1007/978-3-642-36362-7_5
Zero-Knowledge Sets with Short Proofs, Euro- crypt'08, pp.433-450, 2008. ,
DOI : 10.1007/978-3-540-78967-3_25
URL : https://hal.archives-ouvertes.fr/hal-01110386
Multiple Denominations in E-cash with Compact Transaction Data, FC 2010, pp.82-97, 2010. ,
DOI : 10.1007/978-3-642-14577-3_9
Verifiable secret sharing and achieving simultaneity in the presence of faults, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), pp.383-395, 1985. ,
DOI : 10.1109/SFCS.1985.64
Mercurial Commitments with Applications to Zero-Knowledge Sets, Eurocrypt'05, pp.422-439, 2005. ,
D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, Eurocrypt 2014, pp.622-639, 2014. ,
DOI : 10.1007/978-3-642-55220-5_34
Supporting Non-membership Proofs with Bilinear-map Accumulators, Cryptology ePrint Archive, 2008. ,
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives, CT-RSA 2015, pp.127-144, 2015. ,
DOI : 10.1007/978-3-319-16715-2_7
Magic Functions, FOCS'99, pp.523-534, 1999. ,
A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987. ,
DOI : 10.1109/SFCS.1987.4
Leveled Fully Homomorphic Signatures from Standard Lattices, Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15, pp.469-477, 2015. ,
DOI : 10.1145/2746539.2746576
Efficient Non-interactive Proof Systems for Bilinear Groups, Euro- crypt'08, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Blockwise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, IMACC 2011, pp.431-450, 2011. ,
Constant-Size Commitments to Polynomials and Their Applications, Asiacrypt 2010, pp.177-194, 2010. ,
DOI : 10.1007/978-3-642-17373-8_11
Nearly Optimal Verifiable Data Streaming, PKC 2016, pp.417-445, 2016. ,
DOI : 10.1007/978-3-662-49384-7_16
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
Universal Accumulators with Efficient Nonmembership Proofs, ACNS 2007, pp.253-269, 2007. ,
DOI : 10.1007/978-3-540-72738-5_17
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, TCC 2010, pp.499-517, 2010. ,
DOI : 10.1007/11426639_7
Secure Accumulators from Euclidean Rings without Trusted Setup, ACNS 2012, pp.224-240, 2012. ,
DOI : 10.1007/978-3-642-31284-7_14
A Certified Digital Signature, LNCS, vol.435, pp.218-238, 1989. ,
DOI : 10.1007/0-387-34805-0_21
Zero-knowledge sets, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings., pp.80-91, 2003. ,
DOI : 10.1109/SFCS.2003.1238183
Verifiable random functions, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), pp.120-130, 1999. ,
DOI : 10.1109/SFFCS.1999.814584
On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003. ,
DOI : 10.1007/978-3-540-45146-4_6
Accumulators from Bilinear Pairings and Applications, CT-RSA'05, pp.275-292, 2005. ,
DOI : 10.1007/978-3-540-30574-3_19
Efficient Consistency Proofs for Generalized Queries on a Committed Database, ICALP'04, pp.1041-1053, 2004. ,
DOI : 10.1007/978-3-540-27836-8_87
Optimal Verification of Operations on Dynamic Sets, Crypto 2011, pp.91-110, 2011. ,
DOI : 10.1007/978-3-642-22792-9_6
Streaming Authenticated Data Structures, EUROCRYPT 2013, pp.353-370, 2013. ,
DOI : 10.1007/978-3-642-38348-9_22
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Crypto'91, pp.129-140, 1991. ,
DOI : 10.1007/3-540-46766-1_9
Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27