dblp.uni-trier.dewww.uni-trier.de

Jens Groth

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
21EEJens Groth, Yuval Ishai: Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. EUROCRYPT 2008: 379-396
20EEJens Groth, Amit Sahai: Efficient Non-interactive Proof Systems for Bilinear Groups. EUROCRYPT 2008: 415-432
2007
19EEJens Groth: Fully Anonymous Group Signatures Without Random Oracles. ASIACRYPT 2007: 164-180
18EEJens Groth, Steve Lu: A Non-interactive Shuffle with Pairing Based Verifiability. ASIACRYPT 2007: 51-67
17EEJens Groth, Rafail Ostrovsky: Cryptography in the Multi-string Model. CRYPTO 2007: 323-341
16EENishanth Chandran, Jens Groth, Amit Sahai: Ring Signatures of Sub-linear Size Without Random Oracles. ICALP 2007: 423-434
15EEJens Groth, Steve Lu: Verifiable Shuffle of Large Size Ciphertexts. Public Key Cryptography 2007: 377-392
14EEJens Groth, Amit Sahai: Efficient Non-interactive Proof Systems for Bilinear Groups. Electronic Colloquium on Computational Complexity (ECCC) 14(053): (2007)
2006
13EEJens Groth: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. ASIACRYPT 2006: 444-459
12EEJens Groth, Rafail Ostrovsky, Amit Sahai: Non-interactive Zaps and New Techniques for NIZK. CRYPTO 2006: 97-111
11EEJens Groth, Rafail Ostrovsky, Amit Sahai: Perfect Non-interactive Zero Knowledge for NP. EUROCRYPT 2006: 339-358
10EEDouglas Wikström, Jens Groth: An Adaptively Secure Mix-Net Without Erasures. ICALP (2) 2006: 276-287
2005
9EEJens Groth: Non-interactive Zero-Knowledge Arguments for Voting. ACNS 2005: 467-482
8EEJens Groth: Cryptography in Subgroups of Zn. TCC 2005: 50-65
7EEJens Groth, Rafail Ostrovsky, Amit Sahai: Perfect Non-Interactive Zero Knowledge for NP Electronic Colloquium on Computational Complexity (ECCC)(097): (2005)
2004
6EEJens Groth: Evaluating Security of Voting Schemes in the Universal Composability Framework. ACNS 2004: 46-60
5EEJens Groth: Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. Financial Cryptography 2004: 90-104
4EEJan Camenisch, Jens Groth: Group Signatures: Better Efficiency and New Theoretical Aspects. SCN 2004: 120-133
3EEJens Groth: Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. TCC 2004: 152-170
2003
2EEJens Groth: A Verifiable Secret Shuffle of Homomorphic Encryptions. Public Key Cryptography 2003: 145-160
1EEIvan Damgård, Jens Groth: Non-interactive and reusable non-malleable commitment schemes. STOC 2003: 426-437

Coauthor Index

1Jan Camenisch [4]
2Nishanth Chandran [16]
3Ivan Damgård [1]
4Yuval Ishai [21]
5Steve Lu [15] [18]
6Rafail Ostrovsky [7] [11] [12] [17]
7Amit Sahai [7] [11] [12] [14] [16] [20]
8Douglas Wikström [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)