Get Shorty via Group Signatures without Encryption
From MaRDI portal
Publication:3588355
DOI10.1007/978-3-642-15317-4_24zbMath1291.94179MaRDI QIDQ3588355
Jan Camenisch, Bogdan Warinschi, Gregory Neven, Patrik Bichsel, Nigel P. Smart
Publication date: 10 September 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15317-4_24
94A62: Authentication, digital signatures and secret sharing
Related Items
On QA-NIZK in the BPK Model, Group signatures and more from isogenies and lattices: generic, simple, and efficient, A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation, Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG, Threshold signatures with private accountability, A lattice-based group signature scheme with verifier-local revocation, Group signatures with user-controlled and sequential linkability, Updatable signatures and message authentication codes, Partially structure-preserving signatures: lower bounds, constructions and more, Group signatures and more from isogenies and lattices: generic, simple, and efficient, Rerandomizable signatures under standard assumption, Foundations of fully dynamic group signatures, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, Practical dynamic group signatures without knowledge extractors, Foundations of Fully Dynamic Group Signatures, Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability