Author of the publication

Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.

, and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 331-345. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faire anonyme Zahlungssysteme., , and . GI Jahrestagung, page 254-265. Springer, (1995)Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment., , , and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 256-275. Springer, (2014)Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products., , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 417-432. Springer, (2002)An Efficient Fair Payment System., , and . ACM Conference on Computer and Communications Security, page 88-94. ACM, (1996)User centricity: a taxonomy and open issues., , , and . Digital Identity Management, page 1-10. ACM, (2006)Cryptographic primitives for building secure and privacy respecting protocols.. ACM Conference on Computer and Communications Security, page 361-362. ACM, (2011)Optimal Distributed Password Verification., , and . ACM Conference on Computer and Communications Security, page 182-194. ACM, (2015)Computing on Authenticated Data., , , , , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 1-20. Springer, (2012)Formal Treatment of Privacy-Enhancing Credential Systems., , , , , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones., , and . WPES@CCS, page 37-48. ACM, (2015)