Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displayed 50 items.
- New \((t, n)\) threshold directed signature scheme with provable security (Q2466072) (← links)
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs (Q2481774) (← links)
- Cryptanalysis of ISO/IEC 9796-1 (Q2482334) (← links)
- Breaking and fixing public-key Kerberos (Q2482453) (← links)
- Fine-grained forward-secure signature schemes without random oracles (Q2489913) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- Cryptanalysis of some signature schemes with message recovery (Q2572002) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- Signcryption with non-interactive non-repudiation (Q2572979) (← links)
- Authenticated broadcast with a partially compromised public-key infrastructure (Q2637312) (← links)
- Key regeneration-free ciphertext-policy attribute-based encryption and its application (Q2660936) (← links)
- A novel identity-based multi-signature scheme over NTRU lattices (Q2676475) (← links)
- Algebraic and quantum attacks on two digital signature schemes (Q2689205) (← links)
- Quantum digital signature based on measurement-device-independent continuous-variable scheme (Q2690513) (← links)
- Practical dynamic group signatures without knowledge extractors (Q2692957) (← links)
- Scalable Divisible E-cash (Q2794505) (← links)
- Proxy Signature with Revocation (Q2817801) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings (Q2829956) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures (Q2953775) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- From Identification to Signatures, Tightly: A Framework and Generic Transforms (Q2953785) (← links)
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model (Q2980868) (← links)
- Applications of Signcryption (Q3000039) (← links)
- On the Security of the Winternitz One-Time Signature Scheme (Q3011927) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- On Security Preserving Reductions – Revised Terminology (Q3088200) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack (Q3102784) (← links)
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions (Q3102787) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Adaptive Succinct Garbled RAM or: How to Delegate Your Database (Q3181022) (← links)
- Provable security of digital signatures in the tamper-proof device model (Q3184555) (← links)
- Authentic Quantum Nonces (Q3296712) (← links)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles (Q3392898) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Universally Composable Adaptive Priced Oblivious Transfer (Q3392915) (← links)
- A Storage Efficient Redactable Signature in the Standard Model (Q3399214) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- Merkle tree digital signature and trusted computing platform (Q3443186) (← links)
- Anonymous Communication and Anonymous Cash (Q3452339) (← links)