Short signatures without random oracles and the SDH assumption in bilinear groups

From MaRDI portal
Revision as of 22:06, 2 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2425530


DOI10.1007/s00145-007-9005-7zbMath1140.94373MaRDI QIDQ2425530

Dan Boneh, Xavier Boyen

Publication date: 6 May 2008

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-007-9005-7


94A62: Authentication, digital signatures and secret sharing


Related Items

Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES, An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation, A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication, Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs, Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption, An Efficient On-Line/Off-Line Signature Scheme without Random Oracles, On the Equivalence of Generic Group Models, Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash, Discrete logarithm problems with auxiliary inputs, Generic constructions of integrated PKE and PEKS, Combined schemes for signature and encryption: the public-key and the identity-based setting, Authenticated hash tables based on cryptographic accumulators, Unconditionally anonymous ring and mesh signatures, How to achieve non-repudiation of origin with privacy protection in cloud computing, Programmable hash functions and their applications, Optimistic fair exchange in the enhanced chosen-key model, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, Practical verifiably encrypted signatures without random oracles, Efficient selective identity-based encryption without random oracles, The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem, Time-selective convertible undeniable signatures with short conversion receipts, Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem, An efficient online/offline ID-based short signature procedure using extended chaotic maps, PRE: stronger security notions and efficient construction with non-interactive opening, Confined guessing: new signatures from standard assumptions, On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited, Identity-based signatures in standard model, Efficient fully structure-preserving signatures and shrinking commitments, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, On the analysis of cryptographic assumptions in the generic ring model, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Elliptic curve cryptography: the serpentine course of a paradigm shift, Tight security for signature schemes without random oracles, Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions, Scalable Divisible E-cash, Secret Handshakes with Dynamic Expressive Matching Policy, Linear Encryption with Keyword Search, Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability, Anonymous Data Collection System with Mediators, A Signature Scheme with Efficient Proof of Validity, Towards Restricting Plaintext Space in Public Key Encryption, Ambiguous One-Move Nominative Signature Without Random Oracles, Constant Size Ring Signature Without Random Oracle, Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem, Security of Verifiably Encrypted Signatures and a Construction without Random Oracles, A Practical Leakage-Resilient Signature Scheme in the Generic Group Model, Programmable Hash Functions and Their Applications, Divisible On-Line/Off-Line Signatures, On Randomizing Hash Functions to Strengthen the Security of Digital Signatures


Uses Software


Cites Work