research-lab/publications/bulletins/in-prog/MRL-9999-lrtm-schemes/biblio.bib
Brandon Goodell 5056c7fc79 updating
2017-10-22 10:21:12 -06:00

127 lines
No EOL
3.3 KiB
BibTeX

@article{nakamoto2008bitcoin,
title={{B}itcoin: {A} peer-to-peer electronic cash system},
author={Nakamoto, Satoshi}
}
@article{noether2016ring,
title={Ring confidential transactions},
author={Noether, Shen and Mackenzie, Adam and others},
journal={Ledger},
volume={1},
pages={1--18},
year={2016}
}
@inproceedings{liu2004linkable,
title={Linkable spontaneous anonymous group signature for ad hoc groups},
author={Liu, Joseph K and Wei, Victor K and Wong, Duncan S},
booktitle={ACISP},
volume={4},
pages={325--335},
year={2004},
organization={Springer}
}
@article{rivest2001leak,
title={How to leak a secret},
author={Rivest, Ronald and Shamir, Adi and Tauman, Yael},
journal={Advances in Cryptology, ASIACRYPT 2001},
pages={552--565},
year={2001},
publisher={Springer}
}
@article{abe20021,
title={1-out-of-n signatures from a variety of keys},
author={Abe, Masayuki and Ohkubo, Miyako and Suzuki, Koutarou},
journal={Advances in Cryptology, Asiacrypt 2002},
pages={639--645},
year={2002},
publisher={Springer}
}
@misc{van2013cryptonote,
title={Cryptonote v 2. 0},
author={van Saberhagen, Nicolas},
year={2013}
}
@inproceedings{pointcheval1996security,
title={Security proofs for signature schemes},
author={Pointcheval, David and Stern, Jacques},
booktitle={Eurocrypt},
volume={96},
pages={387--398},
year={1996},
organization={Springer}
}
@inproceedings{ohta1998concrete,
title={On concrete security treatment of signatures derived from identification},
author={Ohta, Kazuo and Okamoto, Tatsuaki},
booktitle={Annual International Cryptology Conference},
pages={354--369},
year={1998},
organization={Springer}
}
@inproceedings{bresson2002threshold,
title={Threshold ring signatures and applications to ad-hoc groups},
author={Bresson, Emmanuel and Stern, Jacques and Szydlo, Michael},
booktitle={Annual International Cryptology Conference},
pages={465--480},
year={2002},
organization={Springer}
}
@inproceedings{bender2006ring,
title={Ring signatures: Stronger definitions, and constructions without random oracles},
author={Bender, Adam and Katz, Jonathan and Morselli, Ruggero},
booktitle={TCC},
volume={6},
pages={60--79},
year={2006},
organization={Springer}
}
@article{scozzafava1993uniform,
title={Uniform distribution and sum modulo $m$ of independent random variables},
author={Scozzafava, Paola},
journal={Statistics \& probability letters},
volume={18},
number={4},
pages={313--314},
year={1993},
publisher={Elsevier}
}
@misc{maxwell2015borromean,
title={Borromean ring signatures},
author={Maxwell, Gregory and Poelstra, Andrew},
year={2015}
}
@article{bonehthreshold,
title={Threshold Cryptosystems From Threshold Fully Homomorphic Encryption},
author={Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven and Jain, Aayush and Kim, Sam and Rasmussen, Peter MR and Sahai, Amit}
}
@article{shamir1979share,
title={How to share a secret},
author={Shamir, Adi},
journal={Communications of the ACM},
volume={22},
number={11},
pages={612--613},
year={1979},
publisher={ACm}
}
@incollection{shamir1981mental,
title={Mental poker},
author={Shamir, Adi and Rivest, Ronald L and Adleman, Leonard M},
booktitle={The mathematical gardner},
pages={37--43},
year={1981},
publisher={Springer}
}