Pages that link to "Item:Q5459095"
From MaRDI portal
The following pages link to Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures (Q5459095):
Displayed 39 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Cryptography in the multi-string model (Q744350) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs (Q901372) (← links)
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs (Q1648790) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Secret, verifiable auctions from elections (Q1749541) (← links)
- Reconfigurable Cryptography: A Flexible Approach to Long-Term Security (Q2796136) (← links)
- An Efficient Post-Quantum One-Time Signature Scheme (Q2807220) (← links)
- Identity-Based Group Encryption (Q2817806) (← links)
- Foundations of Fully Dynamic Group Signatures (Q2822669) (← links)
- Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability (Q2946483) (← links)
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- Non-interactive Confirmer Signatures (Q3073694) (← links)
- Attribute-Based Signatures (Q3073718) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Efficient Traceable Signatures in the Standard Model (Q3392912) (← links)
- Structure-Preserving Signatures from Standard Assumptions, Revisited (Q3457070) (← links)
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions (Q3457071) (← links)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444) (← links)
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS (Q4916002) (← links)
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size (Q4916017) (← links)
- Verifiable Elections That Scale for Free (Q4916026) (← links)
- 0-RTT Key Exchange with Full Forward Secrecy (Q5270373) (← links)
- Efficient Non-interactive Range Proof (Q5323058) (← links)
- Fully Anonymous Group Signatures Without Random Oracles (Q5387098) (← links)
- Group Encryption (Q5387099) (← links)
- Improved Structure Preserving Signatures Under Standard Bilinear Assumptions (Q5738756) (← links)
- Scalable Multi-party Private Set-Intersection (Q5738787) (← links)
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts (Q5738790) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)