Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Revision as of 22:05, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5307247

DOI10.1007/b97182zbMath1122.94385OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307247

Leonid Reyzin, Silvio Micali, Hovav Shacham, Anna Lysyanskaya

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (29)

MQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesRobust subgroup multi-signatures for consensusA unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemesA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsLocally verifiable signature and key aggregationHalf-aggregation of Schnorr signatures with tight reductionsPointcheval-Sanders signature-based synchronized aggregate signatureIdentity-based interactive aggregate signatures from latticesSecure proxy signature schemes for delegation of signing rightsNon-interactive multisignatures in the plain public-key model with efficient verificationIncrementally aggregatable vector commitments and applications to verifiable decentralized storageFSSE: forward secure searchable encryption with keyed-block chainsSequential aggregate signatures with lazy verification from trapdoor permutationsAmbiguous optimistic fair exchange: definition and constructionsMust the communication graph of MPC protocols be an expander?Notes on the security of certificateless aggregate signature schemesOptimal security proofs for full domain hash. RevisitedHow to protect privacy in optimistic fair exchange of digital signaturesSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesSequential Aggregate Signatures and Multisignatures Without Random OraclesThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceSanitizable and Deletable SignatureProxy Signatures Secure Against Proxy Key ExposureEfficient Sequential Aggregate Signed DataSimple Schnorr multi-signatures with applications to bitcoinSequential aggregate signatures with short public keys without random oracles




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004