scientific article; zbMATH DE number 3825707
From MaRDI portal
Publication:3671884
Cited in
(only showing first 100 items - show all)- Functional encryption against probabilistic queries: definition, construction and applications
- Balancing privacy and accountability in blockchain identity management
- Decentralized anonymous micropayments
- A secure quantum voting scheme based on quantum group blind signature
- Privacy and verifiability in voting systems: methods, developments and trends
- Boosting the Security of Blind Signature Schemes
- Non-interactive blind signatures for random messages
- A multi-bank E-payment protocol based on quantum proxy blind signature
- Attack and improvements of fair quantum blind signature schemes
- A high capacity quantum weak blind signature based on logistic chaotic maps
- Converting normal DLP-based signatures into blind
- Comment: A new blind signature based on the discrete logarithm problem for untraceability
- On the (in)security of ROS
- The Fractal Nature of Bitcoin: Evidence from Wavelet Power Spectra
- A pairing-less identity-based blind signature with message recovery scheme for cloud-assisted services
- Anonymous counting tokens
- Practical round-optimal blind signatures in the ROM from standard assumptions
- Blinding for unanticipated signatures
- Reexamining the security of fair quantum blind signature schemes
- Security of a sessional blind signature based on quantum cryptograph
- Provably secure arbitrated-quantum signature
- Security analysis of particular quantum proxy blind signature against the forgery attack
- New receipt-free voting scheme using double-trapdoor commitment
- Anonymous tokens with stronger metadata bit hiding from algebraic MACs
- \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist
- Quantum blind signature scheme based on quantum walk
- Cryptanalysis and improvement of some quantum proxy blind signature schemes
- Multiparty quantum blind signature scheme based on graph states
- The Abe-Okamoto partially blind signature scheme revisited
- Improved low-computation partially blind signatures.
- An arbitrated proxy blind signature based on hyper entanglement analysis
- An improved proxy blind signature scheme
- Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack
- Majority is not enough: bitcoin mining is vulnerable
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- On removing rejection conditions in practical lattice-based signatures
- Threshold-directed signature scheme based on hybrid number theoretic problems
- A practical anonymous payment scheme for electronic commerce
- A new blind signature based on the discrete logarithm problem for untraceability
- On the unlinkability of randomization-enhanced Chaum's blind signature scheme
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- Secure data deduplication with reliable data deletion in cloud
- Practical Range Proof for Cryptocurrency Monero with Provable Security
- Security of the design of time-stamped signatures
- Coin-based multi-party fair exchange
- Speeding up exponentiation using an untrusted computational resource
- A practical multivariate blind signature scheme
- Structure-preserving signatures and commitments to group elements
- A new quantum payment protocol based on a set of local indistinguishable orthogonal product states
- The One-More Discrete Logarithm Assumption in the Generic Group Model
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus
- Off-line electronic cash based on secret-key certificates
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- Arbitrated quantum signature with Hamiltonian algorithm based on blind quantum computation
- Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
- Efficient construction of vote-tags to allow open objection to the tally in electronic elections
- Unconditionally secure quantum signatures
- A novel quantum proxy blind signature scheme
- A quantum proxy signature scheme by using random sequence to blind the message
- Security issues in Sarkar's e-cash protocol
- Security analysis of RSA-BSSA
- On the (im)possibility of secure ElGamal blind signatures
- Equivocal Blind Signatures and Adaptive UC-Security
- Witness indistinguishability for any single-round argument with applications to access control
- Compact E-Cash and Simulatable VRFs Revisited
- On the design of time-stamped signatures
- Security of blind signatures revisited
- Security analysis and improvement of a blind semi-quantum signature
- Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system
- An attack on a payment scheme
- On the traceability on RSA-based partially signature with low computation
- Scalable Divisible E-cash
- Efficient traceable ring signature scheme without pairings
- Efficient lattice-based blind signatures via Gaussian one-time signatures
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Privacy-preserving blueprints
- Cryptography from one-way communication: on completeness of finite channels
- BlindOR: an efficient lattice-based blind signature scheme from OR-proofs
- S-money: virtual tokens for a relativistic economy
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
- Identity-based blind signature from lattices
- A dynamic quantum group blind signature scheme based on four-particle cluster state
- Identity-based partially blind signature in the standard model for electronic cash
- User efficient recoverable off-line e-cash scheme with fast anonymity revoking
- Snowblind: a threshold blind signature in pairing-free groups
- Untraceability of partial blind and blind signature schemes
- Bug attacks
- Anonymous tokens with public metadata and applications to private contact tracing
- An improved quantum proxy blind signature scheme based on genuine seven-qubit entangled state
- Private set-intersection with common set-up
- Cryptanalysis of an oblivious PRF from supersingular isogenies
- Secure distributed storage and retrieval
- A post-quantum round-optimal oblivious PRF from isogenies
- Identity-based blind signature from lattices in standard model
- Batch RSA signature scheme
- PAPR: publicly auditable privacy revocation for anonymous credentials
- Fault-tolerant quantum blind signature protocols against collective noise
- Quantum public-key designated verifier signature
- Blind digital signature calculation algorithms based on the ukrainian national digital signature standard DSTU 4145-2002 and Russian digital signature standard GOST R 34.10-2001
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3671884)