scientific article

From MaRDI portal
Publication:3671884

zbMath0521.94012MaRDI QIDQ3671884

David Chaum

Publication date: 1983


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted ServicesUntraceability of Partial Blind and Blind Signature SchemesTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsAn Efficient Privacy-Preserving E-coupon SystemOff-line electronic cash based on secret-key certificatesMajority Is Not Enough: Bitcoin Mining Is VulnerableBoosting the Security of Blind Signature SchemesThe One-More Discrete Logarithm Assumption in the Generic Group ModelWhen privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculusA dynamic quantum group blind signature scheme based on four-particle cluster stateAnonymous tokens with public metadata and applications to private contact tracingOn the (im)possibility of secure ElGamal blind signaturesPrivacy-preserving blueprintsSecurity analysis of RSA-BSSAPAPR: publicly auditable privacy revocation for anonymous credentialsNon-interactive blind signatures for random messagesRai-Choo! Evolving blind signatures to the next levelFunctional encryption against probabilistic queries: definition, construction and applicationsElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingHide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRTPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreTwo faces of blindnessOn pairing-free blind signature schemes in the algebraic group modelEfficient lattice-based blind signatures via Gaussian one-time signaturesA Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with AnonymityAnonymous tokens with stronger metadata bit hiding from algebraic MACs\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistCryptanalysis of an oblivious PRF from supersingular isogeniesSecurity analysis and improvement of a blind semi-quantum signatureThe Abe-Okamoto partially blind signature scheme revisitedSnowblind: a threshold blind signature in pairing-free groupsCryptography from one-way communication: on completeness of finite channelsLattice-based e-cash, revisitedOblivious pseudorandom functions from isogeniesCollective Signature Protocols for Signing GroupsThe Fractal Nature of Bitcoin: Evidence from Wavelet Power SpectraIdentity-Based Blind Signature from Lattices in Standard ModelPrivacy Preserving Data Mining within Anonymous Credential SystemsBlind Identity-Based Encryption and Simulatable Oblivious TransferPractical Range Proof for Cryptocurrency Monero with Provable SecurityBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsIdentity-based blind signature from latticesS-money: virtual tokens for a relativistic economyCut Down the Tree to Achieve Constant Complexity in Divisible E-cashOne-Time ProgramsSecurity Enhancement of a Flexible Payment Scheme and Its Role-Based Access ControlOne-Round ID-Based Blind Signature Scheme without ROS AssumptionEquivocal Blind Signatures and Adaptive UC-SecurityScalable Divisible E-cashMulti-theorem preprocessing NIZKs from latticesSecure Data Deduplication with Reliable Data Deletion in CloudSeparation Results on the “One-More” Computational ProblemsOn the (in)security of ROSOn the (in)security of ROSCompact E-Cash and Simulatable VRFs RevisitedUniversally Composable Adaptive Priced Oblivious TransferDeciding knowledge in security protocols under some e-voting theoriesPractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsThreshold-directed signature scheme based on hybrid number theoretic problemsAn improved E-payment protocol based on quantum blind signature without entanglementBlinding for Unanticipated SignaturesDigital SignaturesA Practical Multivariate Blind Signature SchemeEfficient Round-Optimal Blind Signatures in the Standard ModelQMA-Hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-KnowledgeDecentralized Anonymous MicropaymentsMultiparty quantum blind signature scheme based on graph statesA practical anonymous payment scheme for electronic commerceA novel quantum proxy blind signature schemeBalancing privacy and accountability in blockchain identity managementStructure-preserving signatures and commitments to group elementsEfficient construction of vote-tags to allow open objection to the tally in electronic electionsUnconditionally secure quantum signaturesProvably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash systemBug attacksOne-more unforgeability of blind ECDSABlack-box accumulation based on latticesBlindOR: an efficient lattice-based blind signature scheme from OR-proofsFault-tolerant quantum blind signature protocols against collective noiseAn efficient multi-receipt mechanism for uncoercible anonymous electronic votingA correction to a code-based blind signature schemeAttack and improvements of fair quantum blind signature schemesSecurity of blind signatures revisitedQuantum \((t,n)\) threshold proxy blind signature scheme based on Bell statesA quantum multi-proxy multi-blind-signature scheme based on genuine six-qubit entangled stateMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsOn the design of time-stamped signaturesProvably secure randomized blind signature scheme based on bilinear pairingEfficient traceable ring signature scheme without pairingsWOTS-S: a quantum secure compact signature scheme for distributed ledgerPrivacy and verifiability in voting systems: methods, developments and trendsA third-party E-payment protocol based on quantum group blind signatureA trusted third-party E-payment protocol based on locally indistinguishable orthogonal product statesLower bounds and impossibility results for concurrent self compositionQuantum blind signature scheme based on quantum walkProvably secure certificate-based proxy blind signature scheme from pairingsBlind quantum signature with controlled four-particle cluster statesAn improved quantum proxy blind signature scheme based on genuine seven-qubit entangled stateConditional e-payments with transferability




This page was built for publication: