The following pages link to (Q3495643):
Displayed 34 items.
- Tightly secure signatures from lossy identification schemes (Q315555) (← links)
- Identity based identification from algebraic coding theory (Q391761) (← links)
- The 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D. (Q398324) (← links)
- Identity-based partially blind signature in the standard model for electronic cash (Q462748) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- A note on an identity-based ring signature scheme with signer verifiability (Q627180) (← links)
- Fair exchange of valuable information: a generalised framework (Q632798) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers'' (Q1007630) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Improving the exact security of digital signature schemes (Q1596365) (← links)
- Fiat-Shamir for highly sound protocols is instantiable (Q1637340) (← links)
- Certificateless proxy signature from RSA (Q1718225) (← links)
- New identity-based society oriented signature schemes from pairings on elliptic curves (Q1765412) (← links)
- An identity-based society oriented signature scheme with anonymous signers. (Q1853087) (← links)
- Proxy signature schemes based on factoring (Q1853688) (← links)
- Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles (Q2272198) (← links)
- Identity-based ring signatures from RSA (Q2465630) (← links)
- Lower bounds for non-black-box zero knowledge (Q2490264) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- Generic Fully Simulatable Adaptive Oblivious Transfer (Q3011306) (← links)
- Identification Schemes from Key Encapsulation Mechanisms (Q3011903) (← links)
- Efficient Identity-Based Signcryption in the Standard Model (Q3092353) (← links)
- Efficiency Limitations for Σ-Protocols for Group Homomorphisms (Q3408215) (← links)
- Prepaid electronic cheques using public-key certificates (Q4608505) (← links)
- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications (Q4916004) (← links)
- Tighter Reductions for Forward-Secure Signature Schemes (Q4916016) (← links)
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks (Q4933209) (← links)
- Formal and Precise Analysis of Soundness of Several Shuffling Schemes (Q4933216) (← links)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Lattice-Based Identification Schemes Secure Under Active Attacks (Q5445452) (← links)
- On the Security of Online/Offline Signatures and Multisignatures from ACISP’06 (Q5502755) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)