Secure Accumulators from Euclidean Rings without Trusted Setup

Helger Lipmaa. Secure Accumulators from Euclidean Rings without Trusted Setup. In Feng Bao, Pierangela Samarati, Jianying Zhou, editors, Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Volume 7341 of Lecture Notes in Computer Science, pages 224-240, Springer, 2012. [doi]

@inproceedings{Lipmaa12,
  title = {Secure Accumulators from Euclidean Rings without Trusted Setup},
  author = {Helger Lipmaa},
  year = {2012},
  doi = {10.1007/978-3-642-31284-7_14},
  url = {http://dx.doi.org/10.1007/978-3-642-31284-7_14},
  researchr = {https://researchr.org/publication/Lipmaa12},
  cites = {0},
  citedby = {0},
  pages = {224-240},
  booktitle = {Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings},
  editor = {Feng Bao and Pierangela Samarati and Jianying Zhou},
  volume = {7341},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-31283-0},
}