Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
From MaRDI portal
Publication:2377064
DOI10.1007/S00145-012-9126-5zbMATH Open1279.94098OpenAlexW2166844482WikidataQ122219623 ScholiaQ122219623MaRDI QIDQ2377064FDOQ2377064
Authors: Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
Publication date: 27 June 2013
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9126-5
Recommendations
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Sequential aggregate signatures with short public keys without random oracles
- Sequential aggregate signatures with lazy verification from trapdoor permutations
- A certificateless sequential aggregate signature scheme
- Sequential aggregate signatures with lazy verification from trapdoor permutations. (Extended abstract)
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Verifiable encrypted signatures without random oracles
- Sequential aggregate signatures with short public keys: design, analysis and implementation studies
- From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption
Cites Work
- Short signatures from the Weil pairing
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Pairing-Friendly Elliptic Curves of Prime Order
- The random oracle methodology, revisited.
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Elliptic Curve Cryptography
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Secure proxy signature schemes for delegation of signing rights
- Title not available (Why is that?)
- Reducing elliptic curve logarithms to logarithms in a finite field
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Unrestricted Aggregate Signatures
- Perfect Non-interactive Zero Knowledge for NP
- Cryptography and Coding
- Efficient Identity-Based Signatures Secure in the Standard Model
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Sequential Aggregate Signed Data
- Boneh et al.'s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- A digital multisignature scheme using bijective public-key cryptosystems
- Public Key Cryptography – PKC 2004
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
- Information Security and Cryptology - ICISC 2005
Cited In (16)
- Round optimal secure multisignature schemes from lattice with public key aggregation and signature compression
- Practical and robust secure logging from fault-tolerant sequential aggregate signatures
- Sequential aggregate signatures with short public keys without random oracles
- Title not available (Why is that?)
- Blockchain-based two-party fair contract signing scheme
- Synchronized aggregate signatures from the RSA assumption
- Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party
- A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
- Efficient unbounded fault-tolerant aggregate signatures using nested cover-free families
- Practical verifiably encrypted signatures without random oracles
- Signatures from sequential-OR proofs
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- Must the communication graph of MPC protocols be an expander?
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature
This page was built for publication: Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2377064)