Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Revision as of 22:19, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5311558

DOI10.1007/B99099zbMath1104.94045OpenAlexW2477011922MaRDI QIDQ5311558

Jan Camenisch, Anna Lysyanskaya

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099






Related Items (94)

EPID with malicious revocationEfficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesStructure-preserving signatures and commitments to group elementsA property-based attestation protocol for TCMPredicate encryption supporting disjunctions, polynomial equations, and inner productsGeneric Framework for Attribute-Based Group SignatureImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsUnconditionally anonymous ring and mesh signaturesA New Approach to Efficient Revocable Attribute-Based Anonymous CredentialsBlack-box accumulation based on lattices\textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature schemeIssuer-hiding attribute-based credentialsSecurity analysis of DGM and GM group signature schemes instantiated with XMSS-TSkipping the \(q\) in group signaturesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsEnforcing input correctness via certification in garbled circuit evaluationImproved signature schemes for secure multi-party computation with certified inputsA fast and simple partially oblivious PRF, with applicationsShort pairing-free blind signatures with exponential securityImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesShort signatures from Diffie-Hellman: realizing almost compact public keyRerandomizable signatures under standard assumptionEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityBatch verification of short signaturesAnonymous tokens with public metadata and applications to private contact tracingPrivacy-preserving blueprintsSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionPAPR: publicly auditable privacy revocation for anonymous credentialsRevisiting BBS signaturesStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsTraceable constant-size multi-authority credentialsTraceable constant-size multi-authority credentialsPointcheval-Sanders signature-based synchronized aggregate signatureCredential transparency systemYOLO YOSO: fast and simple encryption and secret sharing in the YOSO modelLattice signature with efficient protocols, application to anonymous credentialsAttribute-based anonymous credential: optimization for single-use and multi-useProtego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabricImproved algebraic MACs and practical keyed-verification anonymous credentialsMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemPractical dynamic group signatures without knowledge extractorsConditional e-payments with transferabilityProgrammable hash functions and their applicationsFoundations of fully dynamic group signaturesEfficient oblivious transfers with access controlOn the impossibility of structure-preserving deterministic primitivesA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortFully Anonymous Group Signatures Without Random OraclesGroup EncryptionA provably secure short signature scheme based on discrete logarithmsBreaking and Fixing Anonymous Credentials for the CloudA code-based group signature schemeSubversion-resilient signatures: definitions, constructions and applicationsThe \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problemDecentralized Attribute-Based SignaturesImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsCut Down the Tree to Achieve Constant Complexity in Divisible E-cashA New Dynamic Code-Based Group Signature SchemeA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Compact Group Signatures Without Random OraclesUnclonable Group IdentificationGeneric security-amplifying methods of ordinary digital signaturesUnlinkable Randomizable Signature and Its Application in Group SignatureUniversally Composable Adaptive Oblivious TransferPairings in Trusted ComputingConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesRecovering Lost Device-Bound CredentialsGeneralised asynchronous remote key generation for pairing-based cryptosystemsAuditable attribute-based credentials scheme and its application in contact tracingTight security for signature schemes without random oraclesFormal Treatment of Privacy-Enhancing Credential SystemsSynchronized aggregate signature under standard assumption in the random oracle modelDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsConcurrently secure blind Schnorr signaturesRealizing Hash-and-Sign Signatures under Standard AssumptionsSecret Handshakes with Dynamic Expressive Matching PolicyEfficient redactable signature and application to anonymous credentialsFoundations of Fully Dynamic Group SignaturesRing signatures: Stronger definitions, and constructions without random oraclesEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsA note on the Chen-Morrissey-Smart DAA schemeBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesKeyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic GroupsOn Proofs of Security for DAA SchemesAn Efficient Self-blindable Attribute-Based Credential SchemeA classification of computational assumptions in the algebraic group modelComputing on authenticated dataShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesA strong designated verifier signature scheme tightly related to the LRSW assumptionA Practical Group Signature Scheme Based on Rank MetricPartially structure-preserving signatures: lower bounds, constructions and more







This page was built for publication: Advances in Cryptology – CRYPTO 2004