scientific article

From MaRDI portal
Publication:2778843

zbMath0981.94043MaRDI QIDQ2778843

Anna Lysyanskaya, Jan Camenisch

Publication date: 21 March 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450093

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (92)

Group Signatures with Decentralized TracingCounterexamples to new circular security assumptions underlying iOPrivate authenticationPolicy-based signature scheme from latticesAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityThe KDM-CCA Security of REACTGarbling XOR gates ``for free in the standard modelA New Approach to Efficient Revocable Attribute-Based Anonymous CredentialsIssuer-hiding attribute-based credentialsFiat-Shamir and correlation intractability from strong KDM-secure encryptionNaor-Yung paradigm with shared randomness and applicationsAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelSignatures and Efficient Proofs on Committed Graphs and NP-StatementsAnonymous tokens with public metadata and applications to private contact tracingPrivacy-preserving blueprintsEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsStructure-Preserving Smooth Projective HashingSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelPAPR: publicly auditable privacy revocation for anonymous credentialsRai-Choo! Evolving blind signatures to the next levelOne-time encryption-key technique for the traditional DL-based encryption scheme with anonymityUnidirectional updatable encryption and proxy re-encryption from DDHPost-quantum anonymity of KyberA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreTwo faces of blindnessStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsKDM security for the Fujisaki-Okamoto transformations in the QROMAn Open Mobile Identity Tool: An Architecture for Mobile Identity ManagementNIWI and new notions of extraction for algebraic languagesLattice signature with efficient protocols, application to anonymous credentialsAnonymous tokens with stronger metadata bit hiding from algebraic MACsUniversal amplification of KDM security: from 1-key circular to multi-key KDM\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistKey-oblivious encryption from isogenies with application to accountable tracing signaturesUniversally composable \(\varSigma \)-protocols in the global random-oracle modelBeyond Uber: instantiating generic groups via PGGsReproducible circularly secure bit encryption: applications and realizationsImproved algebraic MACs and practical keyed-verification anonymous credentialsTraceable policy-based signatures and instantiation from latticesMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemUpdatable public key encryption in the standard modelPolicy-compliant signaturesEfficient oblivious transfers with access controlOn the impossibility of structure-preserving deterministic primitivesKDM security for identity-based encryption: constructions and separationsGroup EncryptionBreaking and Fixing Anonymous Credentials for the CloudDecentralized Attribute-Based SignaturesSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesRemoving the Strong RSA Assumption from Arguments over the IntegersA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)OAEP Is Secure under Key-Dependent MessagesFair Traceable Multi-Group SignaturesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionRecovering Lost Device-Bound CredentialsTowards Key-Dependent Message Security in the Standard ModelFormal Treatment of Privacy-Enhancing Credential SystemsCCA security and trapdoor functions via key-dependent-message securityDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsKey-dependent message security: generic amplification and completenessA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsSecurity under message-derived keys: signcryption in iMessageRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsLarge scale, actively secure computation from LPN and free-XOR garbled circuitsThreshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingGroup signatures with user-controlled and sequential linkabilityRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksMaster-key KDM-secure ABE via predicate encodingNaor-Yung Paradigm with Shared Randomness and ApplicationsBounded KDM Security from iO and OWFThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsEfficient fully structure-preserving signatures and shrinking commitmentsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesAn Efficient Self-blindable Attribute-Based Credential SchemeSurvey of Lattice-Based Group SignatureAnonymous tokens with private metadata bitLattice-based blind signatures, revisitedSoundness of Formal Encryption in the Presence of Key-CyclesGarbled Circuits as Randomized Encodings of Functions: a PrimerSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionTurboIKOS: improved non-interactive zero knowledge and post-quantum signaturesBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model




This page was built for publication: