-
-
Notifications
You must be signed in to change notification settings - Fork 1
/
references.bib
262 lines (237 loc) · 9.54 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
<% Encoding: UTF-8
@article{bls381-12,
title={Constructing Elliptic Curves with Prescribed Embedding Degrees},
author={Barreto, P. S. L. M. and Lynn, B. and Scott, M.},
journal={Springer},
conference={Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers},
year = {2003}
}
@inproceedings{discrete-log-attack,
title={A key recovery attack on discrete log-based schemes using a prime order subgroup},
author={Lim, Chae Hoon and Lee, Pil Joong},
booktitle={Annual International Cryptology Conference},
pages={249--263},
year={1997},
organization={Springer}
}
@article{updating-key-pairings,
title={Updating key size estimations for pairings},
author={Barbulescu, Razvan and Duquesne, Sylvain},
journal={Journal of Cryptology},
volume={32},
number={4},
pages={1298--1336},
year={2019},
publisher={Springer}
}
@Article{random-oracle,
author={Koblitz, Neal
and Menezes, Alfred J.},
title={The random oracle model: a twenty-year retrospective},
journal={Designs, Codes and Cryptography},
year={2015},
month={Dec},
day={01},
volume={77},
number={2},
pages={587-610},
issn={1573-7586},
doi={10.1007/s10623-015-0094-2},
url={https://doi.org/10.1007/s10623-015-0094-2}
}
@TECHREPORT{DDH-problem,
author="Boneh, Dan",
editor="Buhler, Joe P.",
title="The Decision Diffie-Hellman problem",
institution="Stanford University",
booktitle="Algorithmic Number Theory",
year="1998",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="48--63",
abstract="The Decision Diffie-Hellman assumption (ddh) is a gold mine. It enables one to construct efficient cryptographic systems with strong security properties. In this paper we survey the recent applications of DDH as well as known results regarding its security. We describe some open problems in this area.",
isbn="978-3-540-69113-6"
}
@TECHREPORT{lrsw-assumption,
title={Pseudonym systems},
author={Lysyanskaya, Anna and Rivest, Ronald L and Sahai, Amit and Wolf, Stefan},
booktitle={International Workshop on Selected Areas in Cryptography},
pages={184--199},
institution="MIT, ETH Zurich",
year={1999},
organization={Springer}
}
@standard{eudi-arf,
title={European digital identity architecture and reference framework},
author={eIDAS expert group},
organization={Europe, Commission},
url={https://eu-digital-identity-wallet.github.io/}
}
@techreport{sd-jwt,
author={Fett, D. and Yasuda, K. and Campbell, B},
title={Selective Disclosure for JWTs (SD-JWT)},
institution={Internet Engineering Task Force},
url={https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/},
year={2024}
}
@techreport{OID4VCI,
title={OpenID for Verifiable Credential Issuance},
organization={OpenID foundation},
author={Lodderstedt, T. and Yasuda, K. and Looker, T.},
url={https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html}
}
@standard{FIPS-204,
author={National Institute of Standards and Technology},
organization={National Institute of Standards and Technology},
title={Module-Lattice-Based Digital Signature Standard},
url={https://csrc.nist.gov/pubs/fips/204/ipd}
}
@standard{mdoc,
title={ISO/IEC 18013-5:2021},
author={ISO/IEC},
organization={ISO/IEC},
year={2021},
url={https://www.iso.org/standard/69084.html}
}
@techreport{status-lists,
author={Sporny, Manu and Longley, Dave and Steele, Orie and Prorock, Mike and Alkhraishi, Mahmoud},
title={Status lists (W3C)},
year={2023},
institution={W3C Foundation},
url={https://www.w3.org/community/reports/credentials/CG-FINAL-vc-status-list-2021-20230102/}
}
@INPROCEEDINGS{bbs+,
author={Doerner, Jack and Kondi, Yashvanth and Lee, Eysa and Shelat, Abhi and Tyner, LaKyah},
booktitle={2023 IEEE Symposium on Security and Privacy (SP)},
title={Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance},
year={2023},
volume={},
number={},
pages={773-789},
keywords={Privacy;Protocols;Costs;Benchmark testing;Security},
doi={10.1109/SP46215.2023.10179470}}
@inproceedings{w3c-vc,
author = {Garc\'{\i}a-Rodr\'{\i}guez, Jes\'{u}s and Torres Moreno, Rafael and Bernal Bernab\'{e}, Jorge and Skarmeta, Antonio},
title = {Towards a standardized model for privacy-preserving Verifiable Credentials},
year = {2021},
isbn = {9781450390514},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3465481.3469204},
doi = {10.1145/3465481.3469204},
booktitle = {Proceedings of the 16th International Conference on Availability, Reliability and Security},
articleno = {126},
numpages = {6},
keywords = {Verifiable Credentials, p-ABC, privacy},
location = {Vienna, Austria},
series = {ARES '21}
}
@inproceedings{tripartite,
author="Joux, Antoine",
editor="Bosma, Wieb",
title="A One Round Protocol for Tripartite Diffie--Hellman",
booktitle="Algorithmic Number Theory",
year="2000",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="385--393",
isbn="978-3-540-44994-2"
}
@ARTICLE{CRL,
author={Naor, M. and Nissim, K.},
journal={IEEE Journal on Selected Areas in Communications},
title={Certificate revocation and certificate update},
year={2000},
volume={18},
number={4},
pages={561-570},
keywords={Public key;Data structures;Dictionaries;Costs;Robustness;Certification;Credit cards;Scalability;Cathode ray tubes},
doi={10.1109/49.839932}}
@InProceedings{crlcomparison,
author="Gentry, Craig",
editor="Biham, Eli",
title="Certificate-Based Encryption and the Certificate Revocation Problem",
booktitle="Advances in Cryptology --- EUROCRYPT 2003",
year="2003",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="272--293",
abstract="We introduce the notion of certificate-based encryption. In this model, a certificate --- or, more generally, a signature --- acts not only as a certificate but also as a decryption key. To decrypt a message, a keyholder needs both its secret key and an up-to-date certificate from its CA (or a signature from an authorizer). Certificate-based encryption combines the best aspects of identity-based encryption (implicit certification) and public key encryption (no escrow). We demonstrate how certificate-based encryption can be used to construct an efficient PKI requiring less infrastructure than previous proposals, including Micali's Novomodo, Naor-Nissim and Aiello-Lodha-Ostrovsky.",
isbn="978-3-540-39200-2"
}
@inproceedings{tripartite2,
title={A one round protocol for tripartite Diffie--Hellman},
author={Joux, Antoine},
booktitle={International algorithmic number theory symposium},
pages={385--393},
year={2000},
organization={Springer}
}
@inproceedings{pvss,
title={A simple publicly verifiable secret sharing scheme and its application to electronic voting},
author={Schoenmakers, Berry},
booktitle={Annual International Cryptology Conference},
pages={148--164},
year={1999},
url={https://dl.acm.org/doi/10.5555/646764.703956},
organization={Springer}
}
@inproceedings{coconut,
title={Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers},
author={Sonnino, A. and Al-Bassam, M. and Bano, S. and Meiklejohn, S. and Danezis, G.},
booktitle={NDSS Symposium 2019},
year={2019},
organization={Network and Distributed
System Security (NDSS) Symposium},
url={https://arxiv.org/pdf/1802.07344}
}
@article{ebsi,
title={Transforming EU Governance: The Digital Integration through EBSI and GLASS},
author={Dimitrios Kasimatis and William J Buchanan and Mwarwan Abubakar and Owen Lo and Christos Chrysoulas and Nikolaos Pitropakis and Pavlos Papadopoulos and Sarwar Sayeed and Marc Sel},
year={2024},
eprint={2212.03218},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@ARTICLE{dao,
author={Liu, Lu and Zhou, Sicong and Huang, Huawei and Zheng, Zibin},
journal={IEEE Open Journal of the Computer Society},
title={From Technology to Society: An Overview of Blockchain-Based DAO},
year={2021},
volume={2},
number={},
pages={204-215},
keywords={Blockchains;Security;Organizations;Bitcoin;Databases;Fault tolerant systems;Computer hacking;Blockchain;contracts;DAO;fault tolerant system;governance},
doi={10.1109/OJCS.2021.3072661}}
@article{reflow,
title={Reflow: Zero knowledge multi party signatures with application to distributed authentication},
author={Roio, Denis and Ibrisevic, Alberto and D'Intino, Andrea},
journal={arXiv preprint arXiv:2105.14527},
year={2021}
}
@techreport{troncoso,
title={Cryptographers’ Feedback on the EU Digital Identity’s ARF},
author={Baum, Carsten and Hoepman, Jaap-Henk and Blazy, Olivier and Lee, Eysa and Camenisch, Jan and Lehmann, Anja and Lysyanskaya, Anna and Mayrhofer, Ren\'e and Nguyen, Ngoc Khanh and Preneel, Bart and Montgomery, Hart and shelat, abhi and Slamanig, Daniel and Thomsen, Søren Eller and Tessaro, Stefano and Troncoso, Carmela},
year={2024},
month={June}
}
@inproceedings{argon2,
title={Argon2: new generation of memory-hard functions for password hashing and other applications},
author={Biryukov, Alex and Dinu, Daniel and Khovratovich, Dmitry},
booktitle={2016 IEEE European Symposium on Security and Privacy (EuroS\&P)},
pages={292--302},
year={2016},
organization={IEEE}
}
@InProceedings{weilpair,
author={Boneh, Dan and Lynn, Ben and Shacham, Hovav},
editor={Boyd, Colin},
title={Short Signatures from the Weil Pairing},
booktitle={Advances in Cryptology --- ASIACRYPT 2001},
year={2001},
publisher={Springer Berlin Heidelberg},
address={Berlin, Heidelberg},
pages={514--532},
isbn={978-3-540-45682-7}
}
@Comment{jabref-meta: databaseType:bibtex;}