scientific article; zbMATH DE number 2009971

From MaRDI portal
Revision as of 03:33, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4434890

zbMath1038.94553MaRDI QIDQ4434890

Hovav Shacham, Craig Gentry, Ben Lynn, Dan Boneh

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560416.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Compact ring signatures from learning with errorsNon-interactive half-aggregation of EdDSA and variants of Schnorr signaturesRevocable and Linkable Ring SignatureAnother Look at TightnessMQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureStructure-preserving signatures and commitments to group elementsKey-insulated aggregate signatureBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesMulti-designated verifiers signatures: anonymity without encryptionA quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster stateLOVE a pairingPractical post-quantum few-time verifiable random function with applications to AlgorandUnconditionally anonymous ring and mesh signaturesConstant-size structure-preserving signatures: generic constructions and simple assumptionsDelegation with supervisionRobust subgroup multi-signatures for consensusConstant Size Ring Signature Without Random OracleA New Public Remote Integrity Checking Scheme with User PrivacyDissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesPractical non-interactive publicly verifiable secret sharing with thousands of partiesCertificateless aggregate signature scheme secure against fully chosen-key attacksA unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemesEfficient traceable ring signature scheme without pairingsBatch verification of short signaturesKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeHow to Generate and Use Universal SamplersCloud data auditing with designated verifierA Provably Secure Ring Signature Scheme in Certificateless CryptographyAggregate Proxy Signature and Verifiably Encrypted Proxy SignatureA novel scheme of anonymous authentication on trust in pervasive social networkingAn efficient certificateless aggregate signature without pairings for vehicular ad hoc networksPolynomial approximation of bilinear Diffie-Hellman mapsSecure proxy signature schemes for delegation of signing rightsPrivacy preserving multi-party computation delegation for deep learning in cloud computingNon-interactive multisignatures in the plain public-key model with efficient verificationFAS: forward secure sequential aggregate signatures for secure loggingGroup-oriented fair exchange of signaturesOn the security of some aggregate signature schemesAttribute-based optimistic fair exchange: how to restrict brokers with policiesUnrestricted and compact certificateless aggregate signature schemeSecurity weaknesses of a signature scheme and authenticated key agreement protocolsCryptanalysis and improvement of three certificateless aggregate signature schemesA simple transitive signature scheme for directed treesCertificate-based verifiably encrypted signatures from pairingsNested cover-free families for unbounded fault-tolerant aggregate signaturesSequential aggregate signatures with lazy verification from trapdoor permutationsOptimistic fair exchange in the enhanced chosen-key modelAmbiguous optimistic fair exchange: definition and constructionsA t-out-of-n Redactable Signature SchemeVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESHybrid proxy multisignature: a new type multi-party signaturePractical verifiably encrypted signatures without random oraclesSecure Authenticated ComparisonsNotes on the security of certificateless aggregate signature schemesSecurity of BLS and BGLS signatures in a multi-user settingAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesCryptanalysis and improvement of a certificateless aggregate signature schemeAn efficient ring signature scheme from pairingsRogue-key attacks on the multi-designated verifiers signature schemeComparing two pairing-based aggregate signature schemesSequential Aggregate Signatures and Multisignatures Without Random OraclesBlockchain-based two-party fair contract signing schemeOn cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisitedAmbiguous Optimistic Fair ExchangeSanitizable and Deletable SignatureZero-Knowledge Authenticated Order Queries and Order Statistics on a ListAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesCertificate-free \textit{ad hoc} anonymous authenticationInsecurity of an efficient certificateless aggregate signature with constant pairing computationsCertificateless threshold ring signaturePractical Techniques Building on Encryption for Protecting and Managing Data in the CloudShort fail-stop signature scheme based on factorization and discrete logarithm assumptionsTell me the truth: practically public authentication for outsourced databases with multi-user modificationAggregate signature protocol with group leaderBreaking the short certificateless signature schemePractical Short Signature Batch VerificationDeterministic Encoding into Twisted Edwards CurvesFair Threshold Decryption with Semi-Trusted Third PartiesSecurity of Verifiably Encrypted Signatures and a Construction without Random OraclesMultisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key ModelProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesUniversal proxy re-encryptionVerifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and TreesRing signatures: Stronger definitions, and constructions without random oraclesSecurity proofs for identity-based identification and signature schemesOptimal Security Proofs for Signatures from Identification SchemesOn the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and ShachamTowards Security Notions for White-Box CryptographyDesignated Confirmer Signatures with Unified VerificationSimple Schnorr multi-signatures with applications to bitcoinStill wrong use of pairings in cryptographyA secure cross-chain transaction model based on quantum multi-signatureSequential aggregate signatures with short public keys without random oraclesATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availabilityA strong designated verifier signature scheme tightly related to the LRSW assumptionIndifferentiable hashing to ordinary elliptic \(\mathbb{F}_{q} \)-curves of \(j=0\) with the cost of one exponentiation in \(\mathbb{F}_{q} \)


Uses Software





This page was built for publication: