Pages that link to "Item:Q2425530"
From MaRDI portal
The following pages link to Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530):
Displaying 50 items.
- Combined schemes for signature and encryption: the public-key and the identity-based setting (Q259033) (← links)
- Authenticated hash tables based on cryptographic accumulators (Q262258) (← links)
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Practical verifiably encrypted signatures without random oracles (Q506783) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem (Q683912) (← links)
- EPID with malicious revocation (Q826251) (← links)
- Cryptanalysis of a dynamic universal accumulator over bilinear groups (Q826264) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- A scalable post-quantum hash-based group signature (Q831185) (← links)
- Time-selective convertible undeniable signatures with short conversion receipts (Q985073) (← links)
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem (Q1640410) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- An efficient online/offline ID-based short signature procedure using extended chaotic maps (Q2001147) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Confined guessing: new signatures from standard assumptions (Q2018822) (← links)
- Boosting verifiable computation on encrypted data (Q2055689) (← links)
- Efficient redactable signature and application to anonymous credentials (Q2055711) (← links)
- Group signatures with user-controlled and sequential linkability (Q2061926) (← links)
- A classification of computational assumptions in the algebraic group model (Q2096519) (← links)
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption (Q2152147) (← links)
- Dynamic universal accumulator with batch update over bilinear groups (Q2152172) (← links)
- Anonymous single-sign-on for \(n\) designated services with traceability (Q2167743) (← links)
- Robust digital signature revisited (Q2205942) (← links)
- Speeding-up verification of digital signatures (Q2220442) (← links)
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited (Q2275939) (← links)
- Identity-based signatures in standard model (Q2317833) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- On the analysis of cryptographic assumptions in the generic ring model (Q2377063) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions (Q2790054) (← links)
- Scalable Divisible E-cash (Q2794505) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- Linear Encryption with Keyword Search (Q2817812) (← links)
- Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability (Q2946483) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- A Signature Scheme with Efficient Proof of Validity (Q3005577) (← links)
- Towards Restricting Plaintext Space in Public Key Encryption (Q3098005) (← links)
- Ambiguous One-Move Nominative Signature Without Random Oracles (Q3193272) (← links)
- Constant Size Ring Signature Without Random Oracle (Q3194600) (← links)
- Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem (Q3392897) (← links)