scientific article; zbMATH DE number 1942438

From MaRDI portal
Revision as of 02:15, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4409137

zbMath1026.94544MaRDI QIDQ4409137

Emmanuel Bresson, Michael Szydlo, Jacques Stern

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (36)

Short Attribute-Based Signatures for Threshold PredicatesCompressing proofs of \(k\)-out-of-\(n\) partial knowledgeStronger notions and a more efficient construction of threshold ring signaturesUnconditionally anonymous ring and mesh signaturesOne-time traceable ring signaturesA new ring signature scheme with signer-admission propertyLogarithmic-size ring signatures with tight security from the DDH assumptionOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelA multivariate based threshold ring signature schemeEfficient traceable ring signature scheme without pairingsHow to Leak a Secret and Reap the Rewards TooExtendable threshold ring signatures with enhanced anonymityA Provably Secure Ring Signature Scheme in Certificateless CryptographyCryptanalysis of multivariate threshold ring signature schemesMulti-signatures for ECDSA and its applications in blockchainEfficient proofs of knowledge for threshold relationsCount me in! Extendability for threshold ring signaturesLogarithmic-size (linkable) threshold ring signatures in the plain modelThreshold signatures with private accountabilityNon-interactive composition of sigma-protocols via Share-then-HashAcyclicity programming for sigma-protocolsLeakage-resilient ring signature schemesA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryTwo new identity-based threshold ring signature schemesIdentity-based ring signatures from RSAIdentity-based quotable ring signatureAn efficient ring signature scheme from pairingsHidden attribute-based signatures without anonymity revocationA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Policy controlled system with anonymityCertificate-free \textit{ad hoc} anonymous authenticationCertificateless threshold ring signatureCollusion-resistant convertible ring signature schemesThe ring authenticated encryption scheme-how to provide a clue wiselyThreshold ring signatures: new definitions and post-quantum securityRing signatures: Stronger definitions, and constructions without random oracles




This page was built for publication: