More efficient (almost) tightly secure structure-preserving signatures
From MaRDI portal
Publication:1648830
DOI10.1007/978-3-319-78375-8_8zbMATH Open1428.94104OpenAlexW2794856801MaRDI QIDQ1648830FDOQ1648830
Authors: Romain Gay, Dennis Hofheinz, Lisa Kohl, Jia-xin Pan
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_8
Recommendations
- Compact structure-preserving signatures with almost tight security
- Compact structure-preserving signatures with almost tight security
- Improved (almost) tightly-secure structure-preserving signatures
- Improved structure preserving signatures under standard bilinear assumptions
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
Cited In (34)
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
- A simple and efficient framework of proof systems for NP
- Threshold structure-preserving signatures
- Tightly secure signature schemes from the LWE and subset sum assumptions
- Efficient Structure-Preserving Signature Scheme from Standard Assumptions
- Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
- Public Key Cryptography - PKC 2005
- Generic constructions of master-key KDM secure attribute-based encryption
- A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
- Short identity-based signatures with tight security from lattices
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Unbounded HIBE with tight security
- On blockwise symmetric matchgate signatures and higher domain \#CSP
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Short tightly secure signatures for signing a vector of group elements: a new approach
- Improved (almost) tightly-secure structure-preserving signatures
- Signatures of knowledge for Boolean circuits under standard assumptions
- Hierarchical identity-based encryption with tight multi-challenge security
- Partially structure-preserving signatures: lower bounds, constructions and more
- Tightly secure ring signatures in the standard model
- Lattice-based signatures with tight adaptive corruptions and more
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions
- Tighter Reductions for Forward-Secure Signature Schemes
- Optimal tightness for chain-based unique signatures
- Tagged one-time signatures: tight security and optimal tag size
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
- Toothpicks: more efficient fork-free two-round multi-signatures
- Lower bounds on structure-preserving signatures for bilateral messages
- Compact structure-preserving signatures with almost tight security
- Compact structure-preserving signatures with almost tight security
- Structure-preserving public-key encryption with leakage-resilient CCA security
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
- Tightly secure hierarchical identity-based encryption
This page was built for publication: More efficient (almost) tightly secure structure-preserving signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648830)