scientific article
From MaRDI portal
Publication:3792628
zbMath0647.94015MaRDI QIDQ3792628
David Chaum, Jeroen van de Graaf, Jan-Hendrik Evertse
Publication date: 1988
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources ⋮ Minimum disclosure proofs of knowledge ⋮ Secure electronic bills of lading: Blind counts and digital signatures ⋮ Robust Threshold Schemes Based on the Chinese Remainder Theorem ⋮ Programmable hash functions and their applications ⋮ On the impossibility of purely algebraic signatures ⋮ A discrete logarithm implementation of perfect zero-knowledge blobs ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ Efficient signature generation by smart cards ⋮ Practic zero-knowledge proofs: Giving hints and using deficiencies ⋮ Distributed user identification by zero-knowledge access rights proving ⋮ An interactive identification scheme based on discrete logarithms and factoring ⋮ On Schnorr's preprocessing for digital signature schemes ⋮ What security can we achieve within 4 rounds? ⋮ Cryptography based on number fields with large regulator ⋮ Programmable Hash Functions and Their Applications ⋮ Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening ⋮ The Power of Anonymous Veto in Public Discussion ⋮ Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme ⋮ More efficient digital signatures with tight multi-user security ⋮ Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs ⋮ Unnamed Item ⋮ Blinding for Unanticipated Signatures ⋮ Constant-round perfect zero-knowledge computationally convincing protocols