Virtual Smart Cards: How to Sign with a Password and a Server
From MaRDI portal
Publication:2827728
DOI10.1007/978-3-319-44618-9_19zbMath1478.94106MaRDI QIDQ2827728
Jan Camenisch, Kai Samelin, Gregory Neven, Anja Lehmann
Publication date: 21 October 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-44618-9_19
Related Items
Let attackers program ideal models: modularity and composability for adaptive compromise, Auditable asymmetric password authenticated public key establishment, Hardware security without secure hardware: how to decrypt with a password and a server, Virtual Smart Cards: How to Sign with a Password and a Server
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- Robust and efficient sharing of RSA functions.
- Selective Opening Security for Receivers
- Virtual Smart Cards: How to Sign with a Password and a Server
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
- On Adaptively Secure Protocols
- Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn
- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Simplified Threshold RSA with Adaptive and Proactive Security
- On the Theory and Practice of Personal Digital Signatures
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Universally Composable Password-Based Key Exchange
- Equivocal Blind Signatures and Adaptive UC-Security
- Theory of Cryptography