scientific article; zbMATH DE number 4170086
From MaRDI portal
Publication:3495643
zbMATH Open0711.68041MaRDI QIDQ3495643FDOQ3495643
Jean-Jacques Quisquater, Louis Claude Guillou
Publication date: 1990
Title of this publication is not available (Why is that?)
Recommendations
- Identity-based undeniable signatures from bilinear pairings
- Identity-based verifiably encrypted signatures without random oracles
- scientific article
- Topics in Cryptology – CT-RSA 2004
- An efficient identity-based signature scheme with provable security
- Zero knowledge undeniable signature scheme over semigroup action problem
- Publication:4945385
- scientific article; zbMATH DE number 708798
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (53)
- Rogue-instance security for batch knowledge proofs
- On sigma-protocols and (packed) black-box secret sharing schemes
- Identity based identification from algebraic coding theory
- Efficiency Limitations for Σ-Protocols for Group Homomorphisms
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- The 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D.
- Sigma protocols from verifiable secret sharing and their applications
- Prepaid electronic cheques using public-key certificates
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Generic Fully Simulatable Adaptive Oblivious Transfer
- A new framework for the design and analysis of identity-based identification schemes
- Proxy signature schemes based on factoring
- Security proofs for identity-based identification and signature schemes
- Lossy Identification Schemes from Decisional RSA
- Title not available (Why is that?)
- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications
- Fiat-Shamir for highly sound protocols is instantiable
- Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles
- Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions
- Cryptographic reverse firewalls for interactive proof systems
- Optimal resilient threshold GQ signatures
- Tightly secure signatures from lossy identification schemes
- New identity-based society oriented signature schemes from pairings on elliptic curves
- Optimal Security Proofs for Signatures from Identification Schemes
- Lattice-Based Identification Schemes Secure Under Active Attacks
- More efficient digital signatures with tight multi-user security
- Identity-based partially blind signature in the standard model for electronic cash
- Lattice-based signatures with tight adaptive corruptions and more
- DualRing: generic construction of ring signatures with efficient instantiations
- An identity-based society oriented signature scheme with anonymous signers.
- Tighter Reductions for Forward-Secure Signature Schemes
- Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctions
- Cryptographic algorithms for privacy-preserving online applications
- A note on an identity-based ring signature scheme with signer verifiability
- Fair exchange of valuable information: a generalised framework
- Efficient Identity-Based Signcryption in the Standard Model
- Lower bounds for non-black-box zero knowledge
- Two-party adaptor signatures from identification schemes
- Identification Schemes from Key Encapsulation Mechanisms
- A Trustless GQ Multi-signature Scheme with Identifiable Abort
- Improving the exact security of digital signature schemes
- ID-based public key cryptographic systems
- Efficient ID-based key distribution with tamperfree devices
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- On the Security of Online/Offline Signatures and Multisignatures from ACISP’06
- Identity-based ring signatures from RSA
- Bounded tamper resilience: how to go beyond the algebraic barrier
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Formal and Precise Analysis of Soundness of Several Shuffling Schemes
- Certificateless proxy signature from RSA
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3495643)