Pages that link to "Item:Q2425530"
From MaRDI portal
The following pages link to Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530):
Displayed 49 items.
- Combined schemes for signature and encryption: the public-key and the identity-based setting (Q259033) (← links)
- Authenticated hash tables based on cryptographic accumulators (Q262258) (← links)
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Practical verifiably encrypted signatures without random oracles (Q506783) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem (Q683912) (← links)
- Time-selective convertible undeniable signatures with short conversion receipts (Q985073) (← links)
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem (Q1640410) (← links)
- An efficient online/offline ID-based short signature procedure using extended chaotic maps (Q2001147) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Confined guessing: new signatures from standard assumptions (Q2018822) (← links)
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited (Q2275939) (← links)
- Identity-based signatures in standard model (Q2317833) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- On the analysis of cryptographic assumptions in the generic ring model (Q2377063) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions (Q2790054) (← links)
- Scalable Divisible E-cash (Q2794505) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- Linear Encryption with Keyword Search (Q2817812) (← links)
- Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability (Q2946483) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- A Signature Scheme with Efficient Proof of Validity (Q3005577) (← links)
- Towards Restricting Plaintext Space in Public Key Encryption (Q3098005) (← links)
- Ambiguous One-Move Nominative Signature Without Random Oracles (Q3193272) (← links)
- Constant Size Ring Signature Without Random Oracle (Q3194600) (← links)
- Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem (Q3392897) (← links)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles (Q3392898) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Divisible On-Line/Off-Line Signatures (Q3623042) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES (Q4916022) (← links)
- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation (Q4933220) (← links)
- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication (Q4933222) (← links)
- Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs (Q5418497) (← links)
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption (Q5502750) (← links)
- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles (Q5502754) (← links)
- On the Equivalence of Generic Group Models (Q5505469) (← links)
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash (Q5738783) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)
- Generic constructions of integrated PKE and PEKS (Q5963369) (← links)