Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Which languages have 4-round zero-knowledge proofs? (Q421047) (← links)
- Multi-verifier signatures (Q431790) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Short undeniable signatures based on group homomorphisms (Q451120) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Efficient authenticated data structures for graph connectivity and geometric search problems (Q548654) (← links)
- Chosen ciphertext secure authenticated group communication using identity-based signcryption (Q604107) (← links)
- Long-term security and universal composability (Q604632) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- Secure computation without authentication (Q656923) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Certificateless undeniable signatures from bilinear maps (Q712691) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring (Q868950) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- A Cartesian product construction for unconditionally secure authentication codes that permit arbitration (Q914647) (← links)
- A simple transitive signature scheme for directed trees (Q924159) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Rogue-key attacks on the multi-designated verifiers signature scheme (Q963405) (← links)
- A one-time signature using run-length encoding (Q975441) (← links)
- Time-selective convertible undeniable signatures with short conversion receipts (Q985073) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Hybrid commitments and their applications to zero-knowledge proof systems (Q1022606) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Reducing complexity assumptions for statistically-hiding commitment (Q1027978) (← links)
- New approaches for deniable authentication (Q1037236) (← links)
- Batch RSA (Q1363068) (← links)
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures (Q1364901) (← links)
- Secure distributed storage and retrieval (Q1575652) (← links)
- Improving the exact security of digital signature schemes (Q1596365) (← links)
- On the security of RSA with primes sharing least-significant bits (Q1762562) (← links)
- Public key signatures in the multi-user setting. (Q1853080) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- How to sign digital streams (Q1854413) (← links)
- On-line/off-line digital signatures (Q1912770) (← links)
- Signcryption from randomness recoverable public key encryption (Q2269814) (← links)
- Certificateless signature: a new security model and an improved generic construction (Q2383987) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Lower bounds and impossibility results for concurrent self composition (Q2425531) (← links)
- Universally composable symbolic security analysis (Q2429708) (← links)