Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
From MaRDI portal
Publication:3392908
Recommendations
Cites work
- scientific article; zbMATH DE number 1256680 (Why is no real title available?)
- scientific article; zbMATH DE number 1302845 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- scientific article; zbMATH DE number 2009983 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Anonymous Proxy Signatures
- Automata, Languages and Programming
- Compact Group Signatures Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures
- Fully Anonymous Group Signatures Without Random Oracles
- Group Signatures
- Non-interactive Zaps and New Techniques for NIZK
- Optimistic fair exchange of digital signatures
- P-signatures and Noninteractive Anonymous Credentials
- Perfect Non-interactive Zero Knowledge for NP
- Secure proxy signature schemes for delegation of signing rights
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2005
Cited in
(9)- Towards restricting plaintext space in public key encryption
- Structure-preserving signatures and commitments to group elements
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
- Linearly homomorphic structure-preserving signatures and their applications
- Tracing a linear subspace: application to linearly-homomorphic group signatures
- On proving equivalence class signatures secure from non-interactive assumptions
- Multi-theorem preprocessing NIZKs from lattices
- Transferable e-cash: a cleaner model and the first practical instantiation
This page was built for publication: Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3392908)