|
[ASW96] N. Asokan, M. Schunter, and M. Waidner, "Optimistic Protocols for Multi-Party Fair Exchanges". IBM Research Report RZ 2892, IBM Zurich Research Laboratory, Zürich,1996. [ASW97] N. Asokan, M. Schunter, and M. Waidner, "Optimistic Protocols for Fair Exchanges". Proceedings of 4th ACM Conference on Computer and Communications Security, pages 6-7, April 1-4, Zurich, Switzerland, 1997. [ASW98] N. Asokan, V. Shoup, and M. Waidner. "Asynchronous protocols for optimistic fair exchange". In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86--99. IEEE Computer Society Press, May 1998. [BDM98] F. Bao, R. Deng and W. Mao, "Efficient and practical fair exchange protocols with off-line TTP". 1998 IEEE Symposium on Security and Privacy. Oakland, May 1998. pages 77--85. IEEE Compute Society. [Blu83] M. Blum, "How to Exchange Secret Key". ACM Transactions on Computer Systems, 1983. [BCDP91] J. Boyar, D. Chaum, I. Damgard and T. Pedersen. "Convertible Undeniable Signatures". In Advances in Cryptology - proceedings of Crypto’90, Lecture Notes in Computer Science (LNCS) 537, pages 189-205, Springer-Verlag, 1991. [BF98] C. Boyd and E. Foo, "Off-Line Fair Payment Protocols Using Convertible Signatures". In Advances in Cryptology - proceedings of Asiacrypt’98, pages 271-285, Springer-Verlag, 1998. [BCC88] G. Brassard, D. Chaum, C. Crepeau, "Minimum Disclosure Proofs of Knowledge". Journal of Computer and System Sciences, Vol. 37, No. 2, pages 156-189, 1988. [BP90] H. Brk and A. Pfitzmann., "Value Exchange Systems Enabling Security and Unobservability". Computers & Security, 9(8):715 721, 1990. [BCDG87] E. F. Brickell, D. Chaum, I. B. Damgård, and van de J. Graaf, " Gradual and verifiable release of a secret". Advances in Cryptology Proceedings of Crypto ''87. [CA89] D. Chaum and H. V. Antwerpen, "Undeniable Signature". In Advances in Cryptology - proceedings of Crypto''89, Lecture Notes in Computer Science (LNCS) 435, pages 212-217, Springer-Verlag, 1989. [Cha90] D. Chaum, "Zero-knowledge Undeniable Signature". In Advances in Cryptology - proceedings of Eurcorypt''90, Lecture Notes in Computer Science (LNCS) 473, pages 458-464, Springer-Verlag, 1990. [Cha94] D. Chaum, "Designated Confirmer Signatures". In Eurocrypt''94, pages 86-91, 1994.[Jak94] M. Jakobsson. Blackmailing Using Undeniable Signature. In Eurocrypt''94, pages 425-427, 1994. [CH94] J. L. Chen and T. Hwang, "Identity-based conference key broadcast schemes with authentication". Computers and Security, (13), pp.99-105(1994). [Che98] L. Chen, "Efficient Fair Exchange with Verifiable Confirmation of Signatures". In Advances in Cryptology - proceedings of Asiacrypt’98, pages 286-299, Springer-Verlag, 1998. [Cle89] R. Cleve, "Controlled gradual disclosure schemes for random bits and their applications". Advances in Cryptology Proceedings of Crypto ''89. [CM00] J. Camenisch, "Markus Michels --Confirmer Signature Schemes Secure against Adaptive Adversaries". Eurocrypt ‘2000 [Dam94] I. B. Damgard, "Practical and provably secure release of a secret and exchange of signatures". Practical and provably secure release of a secret and exchange of signatures, Advances in Cryptology: Proceedings of EUROCRYPT 93 (T. Helleseth, ed.), Lecture Notes in Computer Science, Springer-Verlag, 765 (1994), pp. 201--217. [FR97] M. K. Franklin and M. K. Reiter, "Fair exchange with a semi-trusted third party". Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 1-5, April 1-4, Zurich, Switzerland, 1997. [FOO92] A. Fujioka, T. Okamoto, K. Ohta, "Interactive Bi-Proof Systems and Undeniable Signature Schemes". In Advances in Cryptology - proceedings of Eurocrypt''91, Lecture Notes in Computer Science, pages 243-256, Springer-Verlag, 1992. [GKR97] R. Gennaro, H. Krawczyk, and T. Rabin. "RSA-Based Undeniable Signatures". In Advances in Cryptology - proceedings of Crypto''97, Lecture Notes in Computer Science (LNCS) 1294, pages 132-149, Springer-Verlag, 1997. [GKR99] R. Gennaro, H. Krawczyk and T. Rabin. "Undeniable Certificates". Electronic Letters, vol. 35, no. 20, pages 1723-1724, Sep. 1999. [HC94] T. Hwang and J. L. Chen,"Identity based conference key broadcast systems". IEE Proceedings Computers and Digital Techniques, Vol.141, No.1, 1994, pp.57-60. [HLWK95]T. Hwang, N. Y. Lee, C. H. Wang, and M. Y. Ko "On the Security of Wu and Yeh''s Conference Key Distribution System". Computer Communications, Vol. 18, No.12, pp.978-981, Dec,1995. [ITW82] I. Ingemarsson, D. T. Tang, and C. K. Wong, "A Conference key distribution system". IEEE Transaction on Information theory , Vol. IT-28 , No.5 ,1982 , pp.714-720 . [Jak94] M. Jakobsson, "Blackmailing Using Undeniable Signature". In Eurocrypt’94, pages 425-427, 1994. [JSI96] M. Jakobsson, K. Sako and R. Impagliazzo, "Designated Verifier Proofs and Their Application". In Advances in Cryptology - proceedings of EuroCrypt''96, Lecture Notes in Computer Science (LNCS) 1070, pages 143-154, Springer-Verlag, 1996. [KO88] K. Koyama, and K. Ohta, "Identity-based Conference Key Distribution Systems". Advances in Cryptology - Crypto''87,Springs-Verlag, pp.175 - 184, 1988. [KO89] K. Koyama, and K. Ohta, "Security of Improved Identity-based Conference Key Distribution Systems". Advances in Cryptology - Eurocrypt''88, Springs-Verlag, pp.11 - 19, 1989. [LHL89] C. S. Laih, S. M. Yan, and J.Y. Lee ,"A New Threshold Schemes and Its Application in Designing the Conference Key Distribution Cryposystem". Information Processing Letters,Vol.32,pp.95-99,1989. [MY92] U. M. Maurer, and Y. Yacobi, "Non-interactive Public Key Cryptography". Advances in Cryptology - Eurocrypt''91, pp. 498-507, 1992. [MS98] M. Michels and M. Stadler. "Generic Constructions for Secure and Efficient Confirmer Signature Schemes". In Advances in Cryptology - Eurocrypt''98, Lecture Notes in Computer Science, pages 406-421, Springer-Verlag, 1998. [NMV99] K. Nguyen, Y. Mu, and V. Varadharajan. "Undeniable Confirmer Signature". Information Security - Proceedings of Second International Workshop, ISW''99, Lecture Notes in Computer Science (LNCS) 1729, pages 235-246, Springer-Verlag, 1999. [Oka94] T. Okamoto, "Designated Confirmer Signatures and Public-key Encryption Are Equivalent". In Advances in Cryptology - Crypto''94, Lecture Notes in Computer Science (LNCS) 839, pages 61-74, Springer-Verlag, 1994. [Ped91] T. Pedersen, "Distributed Provers with Applications to Undeniable Signatures". In Advances in Cryptology - proceedings of Eurocrypt''91, pages 221-242, Springer-Verlag, 1991. [Pet97] H. Petersen, "How to Convert any Digital Signature Scheme into a Group Signature Scheme". Proc. of Security Protocols Workshop''97, LNCS 1361, pages 67-78, Spring Verlag, 1997. [PH78] S. Pohlig and M.E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance". IEEE Transactions on Information Theory, vol. IT-24, 1978, pp. 106-110. [RR01] I. Ray and I. Ray, "An Anonymous Fair-Exchange E-Commerce Protocol". Proceedings of the First International Workshop on Internet Computing and E-Commerce, San Francisco, CA, April 2001. [Sch94] B. Schneier, "A primer on authentication and digital signature". Computer Security Journal, v,10, n.2, 1994, pp. 38-40 [SS98] S. Saeednia and R. Safavi-Naini, "Efficient Identity-Based Conference Key Distribution Protocols". ACISP’98,1998. [SK92] A. Simbo and S. Kawamura, "Cryptanalysis of Several Conference Key Distribution Schemes". Asiacrypt’91,pp.155-160. [Ted84] T. Tedrick, "Fair Exchange of Secrets". Advances in Cryptology Proceedings of Crypto ''84 [WC01] C. H. Wang and Y. C. Chen, "Limiting Verifiers in Designated Confirmer Signatures". Proceedings of the Eleventh Information Security Conference, Tainan, R.O.C., pp. 67-73, May 3-4, 2001. [WH97] C. H. Wang and T. Hwang, "Modified Chen-Hwang Identity-based Conference Key Broadcast Schemes with User Authentication". Computers & Security, Vol. 16, No.4, pp.339-344, 1997. [ZG96] J. Zhou and D. Gollmann, "A fair non-repudiation protocol ". In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 55-61, Oakland, CA, May 1996. [ZG97] J. Zhou and D. Gollmann, "An Efficient Non-repudiation Protocol". Proceedings of the 1997 IEEE Computer Security Foundations Workshop (CSFW 10), (IEEE CS Press), pp. 126--132, 1997.
|