Tightly secure signatures and public-key encryption (Q300383): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q120912515, #quickstatements; #temporary_batch_1708039819900
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-015-0062-x / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2022454396 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures and Commitments to Group Elements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tagged One-Time Signatures: Tight Security and Optimal Tag Size / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving Tight Security for Rabin-Williams Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418529 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434880 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Group Encryption: Non-interactive Realization in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical and Tightly Secure Signature Scheme Without Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409144 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonmalleable Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-line/off-line digital signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public key signatures in the multi-user setting. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hash-and-Sign Signatures Without the Random Oracle / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3775469 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Adaptive Oblivious Transfer from Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Noninteractive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-But-Many Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly Secure Signatures and Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hybrid Encryption from Weakened Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Chosen Ciphertext Secure Encryption from Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient On-Line/Off-Line Signature Scheme without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434879 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Proofs for Signature Schemes without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank

Latest revision as of 05:29, 12 July 2024

scientific article
Language Label Description Also known as
English
Tightly secure signatures and public-key encryption
scientific article

    Statements

    Tightly secure signatures and public-key encryption (English)
    0 references
    0 references
    0 references
    27 June 2016
    0 references
    tight security proofs
    0 references
    structure-preserving signatures
    0 references
    public-key encryption
    0 references
    Groth-Sahai proofs
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers