Citations
This commit is contained in:
parent
07ea8c5643
commit
3631af0abc
@ -2,7 +2,7 @@ A \textit{Zero-Knowledge proof}~\cite{GMR85} (or \textbf{ZK proofs}) is an \text
|
|||||||
|
|
||||||
One of the early applications of \ZK proofs in cryptography is for identification systems~\cite{FS86}.
|
One of the early applications of \ZK proofs in cryptography is for identification systems~\cite{FS86}.
|
||||||
The goal is for a user $A$ to prove the knowledge of a secret (such as a password) to user $B$ without revealing any piece of information about the secret, otherwise user $B$ would be able to impersonate $A$.
|
The goal is for a user $A$ to prove the knowledge of a secret (such as a password) to user $B$ without revealing any piece of information about the secret, otherwise user $B$ would be able to impersonate $A$.
|
||||||
Since then, the use of zero-knowledge proofs is now widespread in privacy-enhancing cryptography:~anonymous credentials, group signatures, electronic voting, e-cash, \ldots
|
Since then, the use of zero-knowledge proofs is now widespread in privacy-enhancing cryptography:~anonymous credentials~\cite{Cha85,CL01}, revocable group signatures~\cite{NFHF09}, e-cash~\cite{CHL05a}, oblivious transfer~\cite{CDN09} \ldots
|
||||||
|
|
||||||
If these primitives flourish in the context of number-theory-based cryptography (such as RSA groups or pairing groups), they are still elusive in the lattice world.
|
If these primitives flourish in the context of number-theory-based cryptography (such as RSA groups or pairing groups), they are still elusive in the lattice world.
|
||||||
|
|
||||||
|
70
these.bib
70
these.bib
@ -1,16 +1,5 @@
|
|||||||
% Encoding: UTF-8
|
% Encoding: UTF-8
|
||||||
|
|
||||||
@InCollection{CL04,
|
|
||||||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
|
||||||
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
|
||||||
booktitle = {{Crypto}},
|
|
||||||
publisher = {Springer},
|
|
||||||
year = {2004},
|
|
||||||
number = {3152},
|
|
||||||
series = {LNCS},
|
|
||||||
pages = {56--72},
|
|
||||||
}
|
|
||||||
|
|
||||||
@InCollection{CL02,
|
@InCollection{CL02,
|
||||||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||||||
title = {A Signature Scheme with Efficient Protocols},
|
title = {A Signature Scheme with Efficient Protocols},
|
||||||
@ -362,14 +351,15 @@
|
|||||||
pages = {268--289},
|
pages = {268--289},
|
||||||
}
|
}
|
||||||
|
|
||||||
@InProceedings{CL04a,
|
@InProceedings{CL04,
|
||||||
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||||||
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
title = {{Signature Schemes and Anonymous Credentials from Bilinear Maps}},
|
||||||
booktitle = {{Crypto}},
|
booktitle = {{Crypto}},
|
||||||
year = {2004},
|
year = {2004},
|
||||||
number = {3152},
|
number = {3152},
|
||||||
series = {LNCS},
|
series = {LNCS},
|
||||||
pages = {56--72},
|
pages = {56--72},
|
||||||
|
publisher = {Springer},
|
||||||
}
|
}
|
||||||
|
|
||||||
@InProceedings{CLM07,
|
@InProceedings{CLM07,
|
||||||
@ -2740,4 +2730,58 @@
|
|||||||
isbn = {978-3-642-03549-4},
|
isbn = {978-3-642-03549-4},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Misc{AG,
|
||||||
|
author = {D. F. Aranha and C. P. L. Gouv\^{e}a},
|
||||||
|
title = {{RELIC is an Efficient LIbrary for Cryptography}},
|
||||||
|
howpublished = {\url{https://github.com/relic-toolkit/relic}},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{CL04a,
|
||||||
|
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
||||||
|
title = {{A Signature Scheme with Efficient Protocols}},
|
||||||
|
booktitle = {{SCN}},
|
||||||
|
year = {2004},
|
||||||
|
series = {LNCS},
|
||||||
|
pages = {268--289},
|
||||||
|
publisher = {Springer},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{Oka06,
|
||||||
|
author = {Okamoto, Tatsuaki},
|
||||||
|
title = {{Efficient Blind and Partially Blind Signatures Without Random Oracles}},
|
||||||
|
booktitle = {{TCC}},
|
||||||
|
year = {2006},
|
||||||
|
series = {LNCS},
|
||||||
|
pages = {80--99},
|
||||||
|
publisher = {Springer},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{GLOW12,
|
||||||
|
author = {Gerbush, Michael and Lewko, Allison and O'Neill, Adam and Waters, Brent},
|
||||||
|
title = {{Dual Form Signatures: An Approach for Proving Security from Static Assumptions}},
|
||||||
|
booktitle = {Asiacrypt},
|
||||||
|
year = {2012},
|
||||||
|
series = {LNCS},
|
||||||
|
pages = {25--42},
|
||||||
|
publisher = {Springer},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{Fre10,
|
||||||
|
author = {Freeman, David Mandell},
|
||||||
|
title = {{Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups}},
|
||||||
|
booktitle = {Eurocrypt},
|
||||||
|
year = {2010},
|
||||||
|
series = {LNCS},
|
||||||
|
pages = {44--61},
|
||||||
|
publisher = {Springer},
|
||||||
|
}
|
||||||
|
|
||||||
|
@Misc{YCZY14,
|
||||||
|
author = {Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu},
|
||||||
|
title = {Exponent-inversion Signatures and IBE under Static Assumptions},
|
||||||
|
howpublished = {Cryptology ePrint Archive, Report 2014/311},
|
||||||
|
year = {2014},
|
||||||
|
note = {\url{https:/ia.cr/2014/311}},
|
||||||
|
}
|
||||||
|
|
||||||
@Comment{jabref-meta: databaseType:bibtex;}
|
@Comment{jabref-meta: databaseType:bibtex;}
|
||||||
|
Loading…
Reference in New Issue
Block a user