Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions Foundations of group signatures: The case of dynamic groups, EUROCRYPT '03 CT-RSA 2005, pp.614-629, 2003. ,
Noninteractive Zero-Knowledge, SIAM Journal on Computing, vol.20, issue.6, pp.1084-1118, 1991. ,
DOI : 10.1137/0220068
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.8702
Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive Boyen and B. Waters. Full-domain subgroup hiding and constant-size group signatures, PKC '07, pp.1-15, 2003. ,
Group Signatures, EUROCRYPT '91, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Nonmalleable Cryptography, FP08] G. Fuchsbauer, D. Pointcheval. Anonymous proxy signatures. SCN '08, pp.391-437, 2000. ,
DOI : 10.1137/S0097539795291562
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.8267
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, Gro07] J. Groth. Fully anonymous group signatures without random oracles. ASIACRYPT '07, pp.281-308, 1988. ,
DOI : 10.1137/0217017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353
Efficient Non-interactive Proof Systems for Bilinear Groups, EUROCRYPT '08, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
Proxy signatures for delegating signing operation, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996. ,
DOI : 10.1145/238168.238185
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, CRYPTO '91, pp.433-444, 1992. ,
DOI : 10.1007/3-540-46766-1_35
How to Leak a Secret, Proceedings of Asiacrypt 2001, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
One-way functions are necessary and sufficient for secure signatures Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 22nd Annual Symposium on Theory of Computing 40th Symposium on Foundations of Computer Science, pp.387-394, 1990. ,
A strong proxy signature scheme with proxy signer privacy protection, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.55-56, 2002. ,
DOI : 10.1109/ENABL.2002.1029988
URL : http://library.cuhk.edu.hk/record=b5891247
Provably secure delegation-by-certification proxy signature schemes. IACR ePrint Archive, Wikström. Hierarchical group signatures. Automata, Languages and Programming, 32nd International Colloquium (ICALP'05), pp.446-458, 2004. ,
DOI : 10.1145/1046290.1046299
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4973