Secret Handshakes with Dynamic and Fuzzy Matching, Network and Distributed System Security Symposium, 2007. ,
Secret handshakes from pairing-based key agreements, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.180-196, 2003. ,
DOI : 10.1109/SECPRI.2003.1199336
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9132
Entity Authentication and Key Distribution, CRYPTO 1993, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Advances in Elliptic Curve Cryptography Lecture Note Series), 2005. ,
Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003. ,
DOI : 10.1137/S0097539701398521
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708
A secure and efficient conference key distribution system, EUROCRYPT 1994, pp.275-286, 1994. ,
DOI : 10.1007/BFb0053443
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, EUROCRYPT 2001, pp.453-474, 2001. ,
DOI : 10.1007/3-540-44987-6_28
Secret Handshakes from CA-Oblivious Encryption, ASIACRYPT 2004, pp.293-307, 2004. ,
DOI : 10.1007/978-3-540-30539-2_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8848
Fixed Argument Pairings, LATINCRYPT 2010, pp.92-108, 2010. ,
DOI : 10.1007/978-3-642-14712-8_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.8250
Provably secure non-interactive key distribution based on pairings, Discrete Applied Mathematics, vol.154, issue.2, pp.270-276, 2006. ,
DOI : 10.1016/j.dam.2005.03.024
URL : https://hal.archives-ouvertes.fr/inria-00386311
Authentication for Paranoids: Multi-party Secret Handshakes, 4th Intl. Conference on Applied Cryptography and Network Security, pp.325-339, 2006. ,
DOI : 10.1007/11767480_22
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement, CT-RSA 2007, pp.287-308, 2007. ,
DOI : 10.1007/11967668_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.9102
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange, CT-RSA 2008, pp.352-369, 2008. ,
DOI : 10.1007/978-3-540-79263-5_23
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes, 5th Intl. Conference on Applied Cryptography and Network Security, pp.270-287, 2007. ,
DOI : 10.1007/978-3-540-72738-5_18
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials, ICALP, pp.715-726, 2008. ,
DOI : 10.1007/978-3-540-70583-3_58
Private Mutual Authentication and Conditional Oblivious Transfer, CRYPTO 2009, pp.90-107, 2009. ,
DOI : 10.1007/978-3-642-03356-8_6
Secret Handshake: Strong Anonymity Definition and Construction, 5th Intl. Conference on Information Security Practice and Experience, pp.219-229, 2009. ,
DOI : 10.1007/11506157_38
Privacy-Preserving Group Discovery with Linear Complexity, 8th Intl. Conference on Applied Cryptography and Network Security, pp.420-437, 2010. ,
DOI : 10.1007/978-3-642-13708-2_25
Practical affiliation-hiding authentication from improved polynomial interpolation, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, 2011. ,
DOI : 10.1145/1966913.1966950
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.1861
Affiliation-Hiding Key Exchange with Untrusted Group Authorities, 8th Intl. Conference on Applied Cryptography and Network Security, pp.402-419, 2010. ,
DOI : 10.1007/978-3-642-13708-2_24
Taming Big Brother Ambitions: More Privacy for Secret Handshakes, 10th Intl. Workshop on Privacy Enhancing Technologies, pp.149-165, 2010. ,
DOI : 10.1007/978-3-642-14527-8_9
Computing the Tate Pairing, CT-RSA, pp.293-304, 2005. ,
DOI : 10.1007/978-3-540-30574-3_20
Identity-Based Cryptosystems and Signature Schemes, CRYPTO 1984, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf
A Fast Implementation of ?T Pairing in Characteristic Three on Intel Core 2 Duo Processor, Cryptology ePrint Archive Report, p.32, 2009. ,
Efficient GF (3 m ) Multiplication Algorithm for ?T Pairing, Cryptology ePrint Archive Report, vol.463, 2007. ,
A Flexible Framework for Secret Handshakes, 6th Intl. Workshop on Privacy Enhancing Technologies, pp.295-315, 2006. ,
DOI : 10.1007/11957454_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.5104
RSA-Based Secret Handshakes, Intl. Workshop on Coding and Cryptography (WCC 2005), pp.252-274, 2005. ,
DOI : 10.1007/11779360_21
URL : https://hal.archives-ouvertes.fr/hal-00019353
-anonymous secret handshakes with reusable credentials, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.158-167, 2004. ,
DOI : 10.1145/1030083.1030105
URL : https://hal.archives-ouvertes.fr/jpa-00251144