Sequential Aggregate Signatures and Multisignatures Without Random Oracles

From MaRDI portal
Revision as of 04:23, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3593112


DOI10.1007/11761679_28zbMath1140.94358MaRDI QIDQ3593112

Hovav Shacham, Steve Lu, Brent Waters, Amit Sahai, Rafail Ostrovsky

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_28


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Non-Interactive Key Exchange, Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, Proxy Signatures Secure Against Proxy Key Exposure, Multi-key Hierarchical Identity-Based Signatures, Efficient Sequential Aggregate Signed Data, Chain Reductions for Multi-signatures and the HBMS Scheme, Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions, Batch arguments for \textsf{NP} and more from standard bilinear group assumptions, Locally verifiable signature and key aggregation, Multi-signatures for ECDSA and its applications in blockchain, Half-aggregation of Schnorr signatures with tight reductions, Pointcheval-Sanders signature-based synchronized aggregate signature, Identity-based interactive aggregate signatures from lattices, Secure proxy signature schemes for delegation of signing rights, Sequential aggregate signatures with lazy verification from trapdoor permutations, Optimistic fair exchange in the enhanced chosen-key model, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, Notes on the security of certificateless aggregate signature schemes, Efficient traceable signatures in the standard model, An enhanced \((t,n)\) threshold directed signature scheme, Efficient discrete logarithm based multi-signature scheme in the plain public key model, Certificate-based verifiably encrypted signatures from pairings, Comparing two pairing-based aggregate signature schemes, Key-insulated aggregate signature, Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security, Non-interactive multisignatures in the plain public-key model with efficient verification, Confined guessing: new signatures from standard assumptions, Two-party adaptor signatures from identification schemes, Two-round trip Schnorr multi-signatures via delinearized witnesses, A quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster state, Robust subgroup multi-signatures for consensus, Simple Schnorr multi-signatures with applications to bitcoin, Sequential aggregate signatures with short public keys without random oracles, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, Attribute-based optimistic fair exchange: how to restrict brokers with policies, Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures, Another Look at Tightness, Security of Verifiably Encrypted Signatures and a Construction without Random Oracles, Efficient Traceable Signatures in the Standard Model, Practical Short Signature Batch Verification



Cites Work