scientific article; zbMATH DE number 1942438
From MaRDI portal
Publication:4409137
zbMath1026.94544MaRDI QIDQ4409137
Emmanuel Bresson, Michael Szydlo, Jacques Stern
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (36)
Short Attribute-Based Signatures for Threshold Predicates ⋮ Compressing proofs of \(k\)-out-of-\(n\) partial knowledge ⋮ Stronger notions and a more efficient construction of threshold ring signatures ⋮ Unconditionally anonymous ring and mesh signatures ⋮ One-time traceable ring signatures ⋮ A new ring signature scheme with signer-admission property ⋮ Logarithmic-size ring signatures with tight security from the DDH assumption ⋮ One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model ⋮ A multivariate based threshold ring signature scheme ⋮ Efficient traceable ring signature scheme without pairings ⋮ How to Leak a Secret and Reap the Rewards Too ⋮ Extendable threshold ring signatures with enhanced anonymity ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ Cryptanalysis of multivariate threshold ring signature schemes ⋮ Multi-signatures for ECDSA and its applications in blockchain ⋮ Efficient proofs of knowledge for threshold relations ⋮ Count me in! Extendability for threshold ring signatures ⋮ Logarithmic-size (linkable) threshold ring signatures in the plain model ⋮ Threshold signatures with private accountability ⋮ Non-interactive composition of sigma-protocols via Share-then-Hash ⋮ Acyclicity programming for sigma-protocols ⋮ Leakage-resilient ring signature schemes ⋮ A New Efficient Threshold Ring Signature Scheme Based on Coding Theory ⋮ Two new identity-based threshold ring signature schemes ⋮ Identity-based ring signatures from RSA ⋮ Identity-based quotable ring signature ⋮ An efficient ring signature scheme from pairings ⋮ Hidden attribute-based signatures without anonymity revocation ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ Policy controlled system with anonymity ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Certificateless threshold ring signature ⋮ Collusion-resistant convertible ring signature schemes ⋮ The ring authenticated encryption scheme-how to provide a clue wisely ⋮ Threshold ring signatures: new definitions and post-quantum security ⋮ Ring signatures: Stronger definitions, and constructions without random oracles
This page was built for publication: