Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
12
views
26
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,212
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — ASIACRYPT '96
A hidden cryptographic assumption in no-transferable indentification schemes
other
Author(s):
Kouichi Sakurai
Publication date
(Online):
June 26 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
26
Record
: found
Abstract
: not found
Article
: not found
The Knowledge Complexity of Interactive Proof Systems
Shafi Goldwasser
,
Silvio Micali
,
Charles Rackoff
(1989)
0
comments
Cited
320
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Zero-knowledge proofs of identity
Amos Fiat
,
Adi Shamir
,
Uriel Feige
(1988)
0
comments
Cited
102
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Witness indistinguishable and witness hiding protocols
U Feige
,
A Shamir
(1990)
0
comments
Cited
66
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1996
Publication date (Online):
June 26 2005
Pages
: 159-172
DOI:
10.1007/BFb0034844
SO-VID:
554b655a-953b-4819-87af-6e8a0c392afa
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A message recovery signature scheme equivalent to DSA over elliptic curves
pp. 15
Cryptographic protocols based on real-quadratic A-fields (extended abstract)
pp. 26
Minding your p's and q's
pp. 36
Authenticated multi-party key agreement
pp. 50
Cryptography and the internet: Lessons and challenges
pp. 57
Generating standard DSA signatures without long inversion
pp. 77
Hash functions based on block ciphers and quaternary codes
pp. 105
On applying linear cryptanalysis to IDEA
pp. 116
A multi-recastable ticket scheme for electronic elections
pp. 133
Observations on non-repudiation
pp. 145
On the efficiency of one-time digital signatures
pp. 159
A hidden cryptographic assumption in no-transferable indentification schemes
pp. 173
Electronic money and key management from global and regional points of view
pp. 185
Limiting the visible space visual secret sharing schemes and their application to human identification
pp. 196
Towards characterizing when information-theoretic secret key agreement is possible
pp. 210
Key sharing based on the wire-tap channel type II concept with noisy main channel
pp. 218
Generalization of higher order SAC to vector output Boolean functions
pp. 266
Cost-effective payment schemes with privacy regulation
pp. 276
Mis-representation of identities in e-cash schemes and how to prevent it
pp. 301
The validation of cryptographic algorithms
pp. 311
Convertible group signatures
pp. 334
On the risk of disruption in several multiparty signature schemes
pp. 346
Correlation attacks on cascades of clock controlled shift registers
pp. 382
A World Wide Number Field Sieve factoring record: On to 512 bits
pp. 91
Generalized Feistel networks
pp. 125
Some remarks on a receipt-free and universally verifiable Mix-type voting scheme
pp. 232
On the correlation immune functions and their nonlinearity
pp. 244
How to date blind signatures
pp. 252
Provably secure blind signature schemes
pp. 286
“Indirect discourse proofs”: Achieving efficient Fair Off-Line e-cash
pp. 322
How to utilize the transformability of digital signatures for solving the oracle problem
pp. 368
The cryptographic security of the syndrome decoding problem for rank distance codes
Similar content
4,212
ChemInform Abstract: INDENTIFICATION OF ASPARAGUSIC ACID AS A NEMATICIDE OCCURING NATURALLY IN THE ROOTS OF ASPARAGUS
Authors:
M. TAKASUGI
,
Y. YACHIDA
,
M. ANTAI
…
Indentification and Inference in Ascending Auctions with Correlated Private Values
Authors:
A Aradillas-Lopez
,
A Gandhi
,
D Quint
Toward a theory of stakeholder indentification and salience: defining the principle of who and what really counts
Authors:
R.K. Mitchell
,
B. Agle
,
D.J. Wood
See all similar