Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307247
DOI10.1007/b97182zbMath1122.94385OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307247
Leonid Reyzin, Silvio Micali, Hovav Shacham, Anna Lysyanskaya
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Related Items (29)
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature ⋮ Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles ⋮ Robust subgroup multi-signatures for consensus ⋮ A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes ⋮ A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement ⋮ Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party ⋮ Batch arguments for \textsf{NP} and more from standard bilinear group assumptions ⋮ Locally verifiable signature and key aggregation ⋮ Half-aggregation of Schnorr signatures with tight reductions ⋮ Pointcheval-Sanders signature-based synchronized aggregate signature ⋮ Identity-based interactive aggregate signatures from lattices ⋮ Secure proxy signature schemes for delegation of signing rights ⋮ Non-interactive multisignatures in the plain public-key model with efficient verification ⋮ Incrementally aggregatable vector commitments and applications to verifiable decentralized storage ⋮ FSSE: forward secure searchable encryption with keyed-block chains ⋮ Sequential aggregate signatures with lazy verification from trapdoor permutations ⋮ Ambiguous optimistic fair exchange: definition and constructions ⋮ Must the communication graph of MPC protocols be an expander? ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Optimal security proofs for full domain hash. Revisited ⋮ How to protect privacy in optimistic fair exchange of digital signatures ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Sequential Aggregate Signatures and Multisignatures Without Random Oracles ⋮ The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance ⋮ Sanitizable and Deletable Signature ⋮ Proxy Signatures Secure Against Proxy Key Exposure ⋮ Efficient Sequential Aggregate Signed Data ⋮ Simple Schnorr multi-signatures with applications to bitcoin ⋮ Sequential aggregate signatures with short public keys without random oracles
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004