scientific article

From MaRDI portal
Publication:3495643

zbMath0711.68041MaRDI QIDQ3495643

Jean-Jacques Quisquater, Louis Claude Guillou

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

DualRing: generic construction of ring signatures with efficient instantiationsFiat-Shamir for highly sound protocols is instantiableTightly secure signatures from lossy identification schemesStacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsOptimal resilient threshold GQ signaturesCryptographic algorithms for privacy-preserving online applicationsIdentity based identification from algebraic coding theoryThe 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D.Lattice-based signatures with tight adaptive corruptions and moreA note on an identity-based ring signature scheme with signer verifiabilityAnamorphic signatures: secrecy from a dictator who only permits authentication!Fair exchange of valuable information: a generalised frameworkPrepaid electronic cheques using public-key certificatesIdentification scheme and forward-secure signature in identity-based setting from isogeniesCertificateless proxy signature from RSAIdentity-based partially blind signature in the standard model for electronic cashLossy Identification Schemes from Decisional RSACryptographic reverse firewalls for interactive proof systemsIdentity-based ring signatures from RSAGeneric Fully Simulatable Adaptive Oblivious TransferIdentification Schemes from Key Encapsulation MechanismsBounded tamper resilience: how to go beyond the algebraic barrierA new framework for the design and analysis of identity-based identification schemesImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsTighter Reductions for Forward-Secure Signature SchemesAn efficient online/offline ID-based short signature procedure using extended chaotic mapsNew identity-based society oriented signature schemes from pairings on elliptic curvesLower bounds for non-black-box zero knowledgeIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksFormal and Precise Analysis of Soundness of Several Shuffling SchemesCryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzlesConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesLattice-Based Identification Schemes Secure Under Active AttacksCryptanalysis of ``an identity-based society oriented signature scheme with anonymous signersEfficient Identity-Based Signcryption in the Standard ModelTwo-party adaptor signatures from identification schemesMore efficient digital signatures with tight multi-user securitySecurity proofs for identity-based identification and signature schemesOptimal Security Proofs for Signatures from Identification SchemesEfficiency Limitations for Σ-Protocols for Group HomomorphismsOn the Security of Online/Offline Signatures and Multisignatures from ACISP’06How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash FunctionsAn identity-based society oriented signature scheme with anonymous signers.Proxy signature schemes based on factoringImproving the exact security of digital signature schemes