scientific article; zbMATH DE number 4191103
From MaRDI portal
Publication:3210163
zbMATH Open0722.68042MaRDI QIDQ3210163FDOQ3210163
Authors: M. Bellare, Shafi Goldwasser
Publication date: 1990
Title of this publication is not available (Why is that?)
Recommendations
Cited In (45)
- Quantum algorithms for the \(k\)-XOR problem
- The 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D.
- Non-interactive zero-knowledge arguments for QMA, with preprocessing
- Updatable NIZKs from non-interactive zaps
- Title not available (Why is that?)
- Digital friend-or-foe authentication
- TurboIKOS: improved non-interactive zero knowledge and post-quantum signatures
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- zk-SNARKs from codes with rank metrics
- Unbounded HIBE with tight security
- Compact E-Cash and Simulatable VRFs Revisited
- An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
- \textsf{Mac'n'Cheese}: zero-knowledge proofs for Boolean and arithmetic circuits with nested disjunctions
- Title not available (Why is that?)
- Fine-grained verifier NIZK and its applications
- Hierarchical identity-based encryption with tight multi-challenge security
- Algebraic partitioning: fully compact and (almost) tightly secure cryptography
- On black-box extension of a non-interactive zero-knowledge proof system for secret equality
- On the impossibility of algebraic NIZK in pairing-free groups
- Pseudorandom functions: three decades later
- Traceable ring signatures: general framework and post-quantum security
- Sound and complete computational interpretation of symbolic hashes in the standard model
- Certifying trapdoor permutations, revisited
- Constrained PRFs for unbounded inputs with short keys
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- Synthesizers and their application to the parallel construction of pseudo-random functions
- Hardness-preserving reductions via cuckoo hashing
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Dual-mode NIZKs: possibility and impossibility results for property transfer
- Sometimes you can't distribute random-oracle-based proofs
- Fully leakage-resilient signatures
- Title not available (Why is that?)
- A new public key cryptosystem over \(\mathbb Z_{n^2}^\ast\)
- Fine-grained secure attribute-based encryption
- Fine-grained secure attribute-based encryption
- Using the numerical solution for partial fractional differential equation by ADI numerical method to cryptography in Hill matrix system
- Resumable zero-knowledge for circuits from symmetric key primitives
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding
- QANIZK for adversary-dependent languages and their applications
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH
- On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
- Pseudo-free families of finite computational elementary abelian \(p\)-groups
- Unlinkable Randomizable Signature and Its Application in Group Signature
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3210163)