The following pages link to (Q4536804):
Displayed 50 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Short undeniable signatures based on group homomorphisms (Q451120) (← links)
- Non-adaptive programmability of random oracle (Q500974) (← links)
- An enhanced \((t,n)\) threshold directed signature scheme (Q726561) (← links)
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham (Q1029059) (← links)
- The wonderful world of global random oracles (Q1648798) (← links)
- Optimal security proofs for full domain hash. Revisited (Q1747667) (← links)
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks (Q1749909) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- Confined guessing: new signatures from standard assumptions (Q2018822) (← links)
- Tight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signatures (Q2055702) (← links)
- On instantiating the algebraic group model from falsifiable assumptions (Q2119007) (← links)
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption (Q2152147) (← links)
- Logarithmic-size ring signatures with tight security from the DDH assumption (Q2167754) (← links)
- Generalized public-key cryptography with tight security (Q2225176) (← links)
- On tight security proofs for Schnorr signatures (Q2423848) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Attribute-based signatures from RSA (Q2437776) (← links)
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme (Q2438535) (← links)
- Identity-based ring signatures from RSA (Q2465630) (← links)
- Generic groups, collision resistance, and ECDSA (Q2572964) (← links)
- Multi-use and unidirectional identity-based proxy re-encryption schemes (Q2638201) (← links)
- Key regeneration-free ciphertext-policy attribute-based encryption and its application (Q2660936) (← links)
- The cost of adaptivity in security games on graphs (Q2697875) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography (Q2796128) (← links)
- Virtual Smart Cards: How to Sign with a Password and a Server (Q2827728) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Cliptography: Clipping the Power of Kleptographic Attacks (Q2953772) (← links)
- Identity-Based Batch Provable Data Possession (Q2953853) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Homomorphic Encryption and Signatures from Vector Decomposition (Q3600493) (← links)
- Strengthening Security of RSA-OAEP (Q3623061) (← links)
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes (Q3637135) (← links)
- MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature (Q5040416) (← links)
- On the security of RSA textbook signature scheme on Paillier ciphertext (Q5040793) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols (Q5458216) (← links)
- Efficient Sequential Aggregate Signed Data (Q5458585) (← links)
- Threshold RSA for Dynamic and Ad-Hoc Groups (Q5458587) (← links)
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme (Q5504550) (← links)
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting (Q6041292) (← links)