Structure-Preserving Signatures and Commitments to Group Elements

From MaRDI portal
Publication:3582756

DOI10.1007/978-3-642-14623-7_12zbMath1280.94102OpenAlexW1527414074MaRDI QIDQ3582756

Kristiyan Haralambiev, Jens Groth, Georg Fuchsbauer, Masayuki Abe, Miyako Ohkubo

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_12




Related Items (max. 100)

Plaintext-Checkable EncryptionStructure-preserving signatures and commitments to group elementsTightly secure signatures and public-key encryptionPolicy-based signature scheme from latticesBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesPractical Round-Optimal Blind Signatures in the Standard ModelStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsConstant-size structure-preserving signatures: generic constructions and simple assumptionsSelectively linkable group signatures -- stronger security and preserved verifiabilitySubversion-resilient enhanced privacy IDGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencySecurity of blind signatures revisitedMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsEfficient chameleon hash functions in the enhanced collision resistant modelPrivacy-enhanced remote data integrity checking with updatable timestampEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityGeneralizing Efficient Multiparty ComputationLinearly homomorphic structure-preserving signatures and their applicationsSignatures and Efficient Proofs on Committed Graphs and NP-StatementsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeA generic construction of tightly secure signatures in the multi-user settingStructure-Preserving Smooth Projective HashingSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionEnd-to-end secure messaging with traceability only for illegal contentRevisiting BBS signaturesOn the security of functional encryption in the generic group modelStructure-preserving linearly homomorphic signature with designated combiner for subspaceRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsDualDory: logarithmic-verifier linkable ring signatures through preprocessingStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsThe Kernel Matrix Diffie-Hellman AssumptionPointcheval-Sanders signature-based synchronized aggregate signatureTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingTraceable receipt-free encryptionHierarchical Attribute-Based SignaturesShorter quasi-adaptive NIZK proofs for linear subspacesAlgebraic reductions of knowledgeMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemFully-succinct publicly verifiable delegation from constant-size assumptionsDory: efficient, transparent arguments for generalised inner products and polynomial commitmentsA CCA-full-anonymous group signature with verifiable controllable linkability in the standard modelAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsBreaking and Fixing Anonymous Credentials for the CloudA Signature Scheme with Efficient Proof of ValiditySimplified small exponent test for batch verificationAchieving Optimal Anonymity in Transferable E-Cash with a JudgeRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelTagged One-Time Signatures: Tight Security and Optimal Tag SizeEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesAccess Control Encryption for Equality, Comparison, and MoreImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsPrivate set-intersection with common set-upNon-Interactive Zero-Knowledge Proofs of Non-MembershipStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient ConstructionsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyMulti-theorem preprocessing NIZKs from latticesTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsLinearly-homomorphic signatures and scalable mix-netsTransferable e-cash: a cleaner model and the first practical instantiationPractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesStructure-preserving public-key encryption with leakage-resilient CCA securityShort tightly secure signatures for signing a vector of group elements: a new approachReal Hidden Identity-Based SignaturesEfficient Round-Optimal Blind Signatures in the Standard ModelAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersPartially structure-preserving signatures: lower bounds, constructions and more




This page was built for publication: Structure-Preserving Signatures and Commitments to Group Elements