scientific article

From MaRDI portal
Publication:3210171

zbMath0722.68050MaRDI QIDQ3210171

Claus Peter Schnorr

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Security properties of one “short” signature schemeInformation-theoretic secure verifiable secret sharing over RSA modulusHidden Collisions on DSSCRT-Based Outsourcing Algorithms for Modular ExponentiationsБезопасная реализация электронной подписи с использованием слабодоверенного вычислителяStoring and Retrieving Secrets on a BlockchainEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeA strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumptionSpeed-stacking: fast sublinear zero-knowledge proofs for disjunctionsUnique-path identity based encryption with applications to strongly secure messagingEnd-to-end secure messaging with traceability only for illegal contentAsymmetric group message franking: definitions and constructionsA lower bound on the length of signatures based on group actions and generic isogeniesThreshold and multi-signature schemes from linear hash functionsZero-knowledge arguments for subverted RSA groupsProvably unforgeable threshold EdDSA with an offline participant and trustless setupIdentity-based encryption in DDH hard groupsLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalHalf-aggregation of Schnorr signatures with tight reductionsOptimal generic attack against basic Boneh-Boyen signaturesSherlock Holmes zero-knowledge protocolsEfficient ECDSA-based adaptor signature for batched atomic swapsKDM security for the Fujisaki-Okamoto transformations in the QROMOn pairing-free blind signature schemes in the algebraic group modelAn Efficient Strong Key-Insulated Signature Scheme and Its ApplicationTriply adaptive UC NIZKReverse firewalls for oblivious transfer extension and applications to zero-knowledgeFast two-party signature for upgrading ECDSA to two-party scenario easilyAnonymous tokens with stronger metadata bit hiding from algebraic MACsIdentity-based signature and extended forking algorithm in the multivariate quadratic settingEfficient NIZK arguments with straight-line simulation and extractionEnd-to-End Verifiable Quadratic Voting with Everlasting PrivacyThreshold signatures with private accountabilityVector commitments over rings and compressed \(\varSigma \)-protocolsProtego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabricZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?Endemic oblivious transfer via random oracles, revisitedLattice-based cryptography: a surveySnowblind: a threshold blind signature in pairing-free groupsOn the impossibility of algebraic NIZK in pairing-free groupsA detailed analysis of Fiat-Shamir with abortsA Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksEPG-representations with Small Grid-SizeImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesSubliminal Hash ChannelsAuthenticated Group Key Agreement Protocol Without PairingNon-Interactive Key ExchangeTighter Reductions for Forward-Secure Signature SchemesCut Down the Tree to Achieve Constant Complexity in Divisible E-cashScalable Multi-party Private Set-IntersectionCryptography based on number fields with large regulatorImproved Bounds on Security Reductions for Discrete Log Based SignaturesFast secure two-party ECDSA signingMulti-theorem preprocessing NIZKs from lattices\(k\)-critical graphs in \(P_5\)-free graphsTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesOn the Security of Cryptosystems with Quadratic Decryption: The Nicest CryptanalysisSPEEDING UP MULTI- EXPONENTIATION ALGORITHM ON A MULTICORE SYSTEMUnifying Zero-Knowledge Proofs of KnowledgeAccess with pseudonymsPublic-key cryptography on smart cardsLeakage-Resilient SignaturesEfficiency Preserving Transformations for Concurrent Non-malleable Zero KnowledgeUnnamed ItemChosen-Ciphertext Secure Proxy Re-encryption without PairingsThe GPS Identification Scheme Using Frobenius ExpansionsAttacks on Secure Logging SchemesEfficient Round-Optimal Blind Signatures in the Standard ModelHow to Challenge and Cast Your e-VotePractical algorithm substitution attack on extractable signaturesTighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsEPID with malicious revocationSoK: how (not) to design and implement post-quantum cryptographyA compressed \(\varSigma \)-protocol theory for latticesCryptography from Learning Parity with NoiseA conference key distribution system for the star configuration based on the discrete logarithm problemFROST: Flexible round-optimized Schnorr threshold signaturesAutomata evaluation and text search protocols with simulation-based securityDoes Fiat-Shamir require a cryptographic hash function?Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash systemGeneric plaintext equality and inequality proofsIntegrating authentication in public key distribution systemFast generation of prime numbers and secure public-key cryptographic parameters.An isogeny-based ID protocol using structured public keysCross-domain attribute-based access control encryptionSelectively linkable group signatures -- stronger security and preserved verifiabilityDelegation with supervisionConcurrent signatures from a variety of keysAdaptively secure threshold symmetric-key encryptionRandom oracles and non-uniformityBootstrapping for approximate homomorphic encryptionOptimal forgeries against polynomial-based MACs and GCMReusing nonces in Schnorr signatures (and keeping it secure...)Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsOn the multi-user security of short Schnorr signatures with preprocessingShort pairing-free blind signatures with exponential securitySecure parameterized pattern matching




This page was built for publication: