A new paradigm for public key identification
From MaRDI portal
Publication:3129463
Recommendations
- A new NP-complete problem and public-key identification
- scientific article; zbMATH DE number 1950355
- Identification schemes from key encapsulation mechanisms
- Public Key Identification Based on the Equivalence of Quadratic Forms
- A NEW METHOD FOR REALIZING PUBLIC-KEY CRYPTOSYSTEM
- scientific article; zbMATH DE number 176557
- Secret Key-Based Identification and Authentication With a Privacy Constraint
- An isogeny-based ID protocol using structured public keys
- Public-key identification schemes based on multivariate cubic polynomials
Cited in
(73)- An efficient statistical zero-knowledge authentication protocol for smart cards
- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
- Public key compression for constrained linear signature schemes
- Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Identity based identification from algebraic coding theory
- A rank metric code-based group signature scheme
- Speeding-up verification of digital signatures
- New results on the Stern identification and signature scheme
- Toward non-interactive zero-knowledge proofs for NP from LWE
- Quasi-dyadic Girault identification scheme
- Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric
- Efficient unique ring signatures from lattices
- A lattice-based group signature scheme with message-dependent opening
- Zero-knowledge proofs for committed symmetric Boolean functions
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Public Key Identification Based on the Equivalence of Quadratic Forms
- scientific article; zbMATH DE number 2081078 (Why is no real title available?)
- A new NP-complete problem and public-key identification
- Lattice-based group signatures: achieving full dynamicity (and deniability) with ease
- SoK: how (not) to design and implement post-quantum cryptography
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- scientific article; zbMATH DE number 5012438 (Why is no real title available?)
- Memory lower bounds of reductions revisited
- Full cryptanalysis of the Chen identification protocol
- Multimodal private signatures
- Secret handshakes: full dynamicity, deniability and lattice-based design
- scientific article; zbMATH DE number 1676653 (Why is no real title available?)
- Disjunctive delimited control
- On tightly-secure (linkable) ring signatures
- scientific article; zbMATH DE number 67084 (Why is no real title available?)
- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
- Cryptanalysis of Harari's identification scheme
- A correction to a code-based blind signature scheme
- Policy-based signature scheme from lattices
- A lattice-based group signature scheme with verifier-local revocation
- Non-interactive composition of sigma-protocols via Share-then-Hash
- A NEW BATCH IDENTIFICATION SCHEME
- Identity-based identification and signature schemes using error correcting codes
- Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
- Verifiable Decryption for Fully Homomorphic Encryption
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Lattice-Based Identification Schemes Secure Under Active Attacks
- scientific article; zbMATH DE number 1796970 (Why is no real title available?)
- Traceable ring signatures: general framework and post-quantum security
- An identification system based on the explicit isomorphism problem
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Black-box accumulation based on lattices
- A gapless code-based hash proof system based on RQC and its applications
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- A code-based group signature scheme
- Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography
- Argument of knowledge of a Goppa codeword and of a bounded error
- Acyclicity programming for sigma-protocols
- Adaptive oblivious transfer with access control from lattice assumptions
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Code-Based Zero Knowledge PRF Arguments
- Efficient code-based fully dynamic group signature scheme
- Secure Stern Signatures in Quantum Random Oracle Model
- Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting
- Post-quantum cryptosystems: open problems and current solutions. Isogeny-based and code-based cryptosystems
- A multi-group signature scheme from lattices
- Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures
- Traceable policy-based signatures and instantiation from lattices
- Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
- Short code-based one-out-of-many proofs and applications
- Zero-knowledge range arguments for signed fractional numbers from lattices
- A gapless post-quantum hash proof system in the Hamming metric
- Fully dynamic attribute-based signatures for circuits from codes
- Bicameral and auditably private signatures
This page was built for publication: A new paradigm for public key identification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3129463)