Pages that link to "Item:Q1772229"
From MaRDI portal
The following pages link to Short signatures from the Weil pairing (Q1772229):
Displaying 50 items.
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- Explicit formula for optimal ate pairing over cyclotomic family of elliptic curves (Q2348162) (← links)
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles (Q2377064) (← links)
- Compact proofs of retrievability (Q2392096) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Heuristics of the Cocks-Pinch method (Q2437964) (← links)
- Design of improved password authentication and update scheme based on elliptic curve cryptography (Q2450508) (← links)
- Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography (Q2512887) (← links)
- A reduction of security notions in designated confirmer signatures (Q2634663) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- Key regeneration-free ciphertext-policy attribute-based encryption and its application (Q2660936) (← links)
- Secure server-aided data sharing clique with attestation (Q2663469) (← links)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (Q2817477) (← links)
- Identity-Based Group Encryption (Q2817806) (← links)
- Efficient three-party authenticated key agreement protocol in certificateless cryptography (Q2885502) (← links)
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings (Q2949239) (← links)
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption (Q2953784) (← links)
- Surnaming Schemes, Fast Verification, and Applications to SGX Technology (Q2975802) (← links)
- RNS arithmetic in 𝔽 pk and application to fast pairing computation (Q3015225) (← links)
- Verifiable Security of Boneh-Franklin Identity-Based Encryption (Q3092349) (← links)
- Identity-Based Deterministic Signature Scheme without Forking-Lemma (Q3098000) (← links)
- A New Public Remote Integrity Checking Scheme with User Privacy (Q3194614) (← links)
- Faster Pairings on Special Weierstrass Curves (Q3392905) (← links)
- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$ (Q3455496) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Security Analysis of the Strong Diffie-Hellman Problem (Q3593084) (← links)
- The Function Field Sieve in the Medium Prime Case (Q3593100) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- A Provably Secure One-Pass Two-Party Key Establishment Protocol (Q3600324) (← links)
- Compact Proofs of Retrievability (Q3600367) (← links)
- Revisiting Pairing Based Group Key Exchange (Q3603004) (← links)
- Practical Short Signature Batch Verification (Q3623054) (← links)
- Realizing Hash-and-Sign Signatures under Standard Assumptions (Q3627443) (← links)
- On Software Parallel Implementation of Cryptographic Pairings (Q3644191) (← links)
- New Constructions and Applications of Trapdoor DDH Groups (Q4916024) (← links)
- Computing $(\ell ,\ell )$-isogenies in polynomial time on Jacobians of genus $2$ curves (Q5246849) (← links)
- Adequate Elliptic Curves for Computing the Product of n Pairings (Q5267791) (← links)
- On the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curves (Q5389447) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- An Analysis of the Vector Decomposition Problem (Q5445460) (← links)
- Separation Results on the “One-More” Computational Problems (Q5458933) (← links)
- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures (Q5504619) (← links)
- Efficient Round-Optimal Blind Signatures in the Standard Model (Q5854440) (← links)
- Algebraic curves and cryptography (Q5921638) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)