Citations
This commit is contained in:
		| @@ -2,7 +2,7 @@ A \textit{Zero-Knowledge proof}~\cite{GMR85} (or \textbf{ZK proofs}) is an \text | ||||
|  | ||||
| One of the early applications of \ZK proofs in cryptography is for identification systems~\cite{FS86}. | ||||
| The goal is for a user $A$ to prove the knowledge of a secret (such as a password) to user $B$ without revealing any piece of information about the secret, otherwise user $B$ would be able to impersonate $A$. | ||||
| Since then, the use of zero-knowledge proofs is now widespread in privacy-enhancing cryptography:~anonymous credentials, group signatures, electronic voting, e-cash, \ldots | ||||
| Since then, the use of zero-knowledge proofs is now widespread in privacy-enhancing cryptography:~anonymous credentials~\cite{Cha85,CL01}, revocable group signatures~\cite{NFHF09}, e-cash~\cite{CHL05a}, oblivious transfer~\cite{CDN09} \ldots | ||||
|  | ||||
| If these primitives flourish in the context of number-theory-based cryptography (such as RSA groups or pairing groups), they are still elusive in the lattice world. | ||||
|  | ||||
|   | ||||
							
								
								
									
										70
									
								
								these.bib
									
									
									
									
									
								
							
							
						
						
									
										70
									
								
								these.bib
									
									
									
									
									
								
							| @@ -1,16 +1,5 @@ | ||||
| % Encoding: UTF-8 | ||||
|  | ||||
| @InCollection{CL04, | ||||
|   author    = {Camenisch, Jan and Lysyanskaya, Anna}, | ||||
|   title     = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, | ||||
|   booktitle = {{Crypto}}, | ||||
|   publisher = {Springer}, | ||||
|   year      = {2004}, | ||||
|   number    = {3152}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {56--72}, | ||||
| } | ||||
|  | ||||
| @InCollection{CL02, | ||||
|   author    = {Camenisch, Jan and Lysyanskaya, Anna}, | ||||
|   title     = {A Signature Scheme with Efficient Protocols}, | ||||
| @@ -362,14 +351,15 @@ | ||||
|   pages     = {268--289}, | ||||
| } | ||||
|  | ||||
| @InProceedings{CL04a, | ||||
| @InProceedings{CL04, | ||||
|   author    = {Camenisch, Jan and Lysyanskaya, Anna}, | ||||
|   title     = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, | ||||
|   title     = {{Signature Schemes and Anonymous Credentials from Bilinear Maps}}, | ||||
|   booktitle = {{Crypto}}, | ||||
|   year      = {2004}, | ||||
|   number    = {3152}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {56--72}, | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @InProceedings{CLM07, | ||||
| @@ -2740,4 +2730,58 @@ | ||||
|   isbn      = {978-3-642-03549-4}, | ||||
| } | ||||
|  | ||||
| @Misc{AG, | ||||
|   author       = {D. F. Aranha and C. P. L. Gouv\^{e}a}, | ||||
|   title        = {{RELIC is an Efficient LIbrary for Cryptography}}, | ||||
|   howpublished = {\url{https://github.com/relic-toolkit/relic}}, | ||||
| } | ||||
|  | ||||
| @InProceedings{CL04a, | ||||
|   author    = {Camenisch, Jan and Lysyanskaya, Anna}, | ||||
|   title     = {{A Signature Scheme with Efficient Protocols}}, | ||||
|   booktitle = {{SCN}}, | ||||
|   year      = {2004}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {268--289}, | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @InProceedings{Oka06, | ||||
|   author    = {Okamoto, Tatsuaki}, | ||||
|   title     = {{Efficient Blind and Partially Blind Signatures Without Random Oracles}}, | ||||
|   booktitle = {{TCC}}, | ||||
|   year      = {2006}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {80--99}, | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @InProceedings{GLOW12, | ||||
|   author    = {Gerbush, Michael and Lewko, Allison and O'Neill, Adam and Waters, Brent}, | ||||
|   title     = {{Dual Form Signatures: An Approach for Proving Security from Static Assumptions}}, | ||||
|   booktitle = {Asiacrypt}, | ||||
|   year      = {2012}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {25--42}, | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @InProceedings{Fre10, | ||||
|   author    = {Freeman, David Mandell}, | ||||
|   title     = {{Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups}}, | ||||
|   booktitle = {Eurocrypt}, | ||||
|   year      = {2010}, | ||||
|   series    = {LNCS}, | ||||
|   pages     = {44--61}, | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @Misc{YCZY14, | ||||
|   author       = {Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu}, | ||||
|   title        = {Exponent-inversion Signatures and IBE under Static Assumptions}, | ||||
|   howpublished = {Cryptology ePrint Archive, Report 2014/311}, | ||||
|   year         = {2014}, | ||||
|   note         = {\url{https:/ia.cr/2014/311}}, | ||||
| } | ||||
|  | ||||
| @Comment{jabref-meta: databaseType:bibtex;} | ||||
|   | ||||
		Reference in New Issue
	
	Block a user