Anonymous protocols: notions and equivalence
From MaRDI portal
Publication:2345446
DOI10.1016/j.tcs.2015.02.042zbMath1321.94104OpenAlexW1981385054MaRDI QIDQ2345446
Paolo D'Arco, Alfredo De Santis
Publication date: 22 May 2015
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2015.02.042
Cites Work
- Secret sets and applications
- On secret set schemes
- Probabilistic encryption
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Robust Encryption
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Nonmalleable Cryptography
- Foundations of Cryptography
- Mercurial Commitments with Applications to Zero-Knowledge Sets
- Zero-Knowledge Sets with Short Proofs
- The security of all RSA and discrete log bits
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Anonymous protocols: notions and equivalence