Structure-Preserving Signatures from Standard Assumptions, Revisited

From MaRDI portal
Revision as of 21:29, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3457070

DOI10.1007/978-3-662-48000-7_14zbMath1352.94043OpenAlexW2186696792WikidataQ59163658 ScholiaQ59163658MaRDI QIDQ3457070

Hoeteck Wee, Jia-xin Pan, Eike Kiltz

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_14



Related Items

QA-NIZK Arguments of Same Opening for Bilateral Commitments, Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs, More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds, Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes, QANIZK for adversary-dependent languages and their applications, Structure-Preserving Smooth Projective Hashing, How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones, Multimodal private signatures, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, Logarithmic-size (linkable) threshold ring signatures in the plain model, The Kernel Matrix Diffie-Hellman Assumption, Attribute-based signatures for range of inner product and its applications, Policy-compliant signatures, Compact structure-preserving signatures with almost tight security, Access Control Encryption for Equality, Comparison, and More, Improved Structure Preserving Signatures Under Standard Bilinear Assumptions, Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts, Unbounded inner product functional encryption from bilinear maps, Tightly secure hierarchical identity-based encryption, New Techniques for Non-interactive Shuffle and Range Arguments, Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions, Structure-preserving public-key encryption with leakage-resilient CCA security, Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages, Partially structure-preserving signatures: lower bounds, constructions and more



Cites Work