Structure-preserving signatures and commitments to group elements
DOI10.1007/S00145-014-9196-7zbMATH Open1355.94042OpenAlexW2013689473MaRDI QIDQ290392FDOQ290392
Authors: Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
Publication date: 1 June 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-014-9196-7
Recommendations
- Structure-preserving signatures and commitments to group elements
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Fully structure-preserving signatures and shrinking commitments
- Efficient fully structure-preserving signatures and shrinking commitments
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
automorphic signaturesblind signaturesGroth-Sahai proofsgroup signatureshomomorphic commitmentsstructure-preserving cryptographystructure-preserving signatures
Cites Work
- Theory of Cryptography
- Security arguments for digital signatures and blind signatures
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Verifiable homomorphic oblivious transfer and private equality test
- Title not available (Why is that?)
- Pairings for cryptographers
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- A framework for universally composable non-committing blind signatures
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Efficient signatures of knowledge and DAA in the standard model
- Malleable proof systems and applications
- Group to group commitments do not shrink
- Scalable group signatures with revocation
- Oblivious transfer with hidden access control from attribute-based encryption
- Group signatures with almost-for-free revocation
- Tightly Secure Signatures and Public-Key Encryption
- Commuting signatures and verifiable encryption
- Achieving optimal anonymity in transferable e-cash with a judge
- One-time signatures and chameleon hash functions
- Structure preserving CCA secure encryption and applications
- Efficient zero-knowledge arguments from two-tiered homomorphic commitments
- Linear Algebra with Sub-linear Zero-Knowledge Arguments
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
- Anonymous Proxy Signatures
- Concurrent Blind Signatures Without Random Oracles
- About the Security of MTI/C0 and MQV
- Fair blind signatures without random oracles
- Structure-preserving signatures and commitments to group elements
- Compact Group Signatures Without Random Oracles
- Perfect NIZK with Adaptive Soundness
- Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
- Universally Composable Adaptive Oblivious Transfer
- Digital Signatures
- Security of Blind Signatures under Aborts
- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
- Group encryption: non-interactive realization in the standard model
- Real traceable signatures
- Title not available (Why is that?)
- Group Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- Computing on authenticated data: new privacy definitions and constructions
- Tagged one-time signatures: tight security and optimal tag size
- Efficient completely context-hiding quotable and linearly homomorphic signatures
- Survey: leakage resilience and the bounded retrieval model
- Title not available (Why is that?)
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Group Signatures with Efficient Concurrent Join
- Fully Anonymous Group Signatures Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Equivocal Blind Signatures and Adaptive UC-Security
- P-signatures and Noninteractive Anonymous Credentials
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Security in Communication Networks
- Topics in Cryptology – CT-RSA 2005
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures
- Round-Optimal Composable Blind Signatures in the Common Reference String Model
- Theory of Cryptography
Cited In (31)
- Foundations of fully dynamic group signatures
- Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs
- Predicate aggregate signatures and applications
- Compressing proofs of \(k\)-out-of-\(n\) partial knowledge
- Tools over bilinear groups for modular design of cryptographic tasks. (Abstract)
- Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Structure-preserving signatures and commitments to group elements
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- Access Control Encryption for Equality, Comparison, and More
- Private polynomial commitments and applications to MPC
- Proofs for inner pairing products and applications
- Round-optimal privacy-preserving protocols with smooth projective hash functions
- Set (non-)membership NIZKs from determinantal accumulators
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- Synchronized aggregate signature under standard assumption in the random oracle model
- Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
- Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier
- Group to group commitments do not shrink
- Round-optimal blind signatures in the plain model from classical and quantum standard assumptions
- Compact structure-preserving signatures with almost tight security
- Pairing-free blind signatures from standard assumptions in the ROM
- A blind coupon mechanism enabling veto voting over unreliable networks
- Fully structure-preserving signatures and shrinking commitments
- Fully-succinct publicly verifiable delegation from constant-size assumptions
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Efficient fully structure-preserving signatures and shrinking commitments
- On the impossibility of structure-preserving deterministic primitives
- On the impossibility of structure-preserving deterministic primitives
- On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
This page was built for publication: Structure-preserving signatures and commitments to group elements
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290392)