Automatic Generation of Sigma-Protocols (2009)

by Endre Bangerter , Thomas Briner , Wilko Henecka , Stephan Krenn , Ahmad-reza Sadeghi , Thomas Schneider
Citations:5 - 0 self

Active Bibliography

8 Automatic generation of sound zero-knowledge protocols (Extended Poster Abstract) – Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-reza Sadeghi, Thomas Schneider - 2008
10 A certifying compiler for zero-knowledge proofs of knowledge based on sigmaprotocols – José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-reza Sadeghi, Thomas Schneider - 2010
8 Bringing zero-knowledge proofs of knowledge to practice – Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-reza Sadeghi, Thomas Schneider - 2009
3 On the design and implementation of efficient zero-knowledge proofs of knowledge – Endre Bangerter, Stephan Krenn, Ahmad-reza Sadeghi, Thomas Schneider, Joe-kai Tsay
3 Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols – José Bacelar Almeida, Gilles Barthe, Manuel Barbosa, Stephan Krenn, Endre Bangerter, Santiago Zanella Béguelin - 2012
90 Compact e-cash – Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya - 2005
14 A general certification framework with applications to privacy-enhancing certificate infrastructures – Jan Camenisch, Thomas Groß, Dieter Sommer - 2005
YACZK: Yet Another Compiler for Zero-Knowledge ⋆ (Poster Abstract) – Endre Bangerter, Stephan Krenn, Ahmad-reza Sadeghi, Thomas Schneider
135 Practical Verifiable Encryption and Decryption of Discrete Logarithms – Jan Camenisch, Victor Shoup - 2003
4 From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design – Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider - 2010
3 A verifiable secret sharing scheme with statistical zero-knowledge – Chunming Tang, Zhuojun Liu, Mingsheng Wang - 2003
9 Balancing accountability and privacy using e-cash (Extended Abstract) – Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya - 2006
unknown title – Anonymous Credentials Light, Foteini Baldimtsi, Anna Lysyanskaya
Security (ACM CCS 2009). This is the full version. Oblivious Transfer with Access Control – Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Proving in Zero-Knowledge that a Committed Integer a � = 0 or a � = 0(mod N) 1) – Chunming Tang, Zhuojun Liu, Mingsheng Wang - 2003
7 A Framework for Practical Universally Composable Zero-Knowledge Protocols – Jan Camenisch, Stephan Krenn, Victor Shoup
3 Charm: A framework for rapidly prototyping cryptosystems. Cryptology ePrint Archive, Report 2011/617 – Joseph A. Akinyele, Matthew Green, Avi Rubin - 2011
Private Client-Side Profiling with Random Forests and Hidden Markov Models – George Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial
121 Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes – Jan Camenisch, Markus Michels - 1998