scientific article

From MaRDI portal
Publication:3792628

zbMath0647.94015MaRDI QIDQ3792628

David Chaum, Jeroen van de Graaf, Jan-Hendrik Evertse

Publication date: 1988


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesMinimum disclosure proofs of knowledgeSecure electronic bills of lading: Blind counts and digital signaturesRobust Threshold Schemes Based on the Chinese Remainder TheoremProgrammable hash functions and their applicationsOn the impossibility of purely algebraic signaturesA discrete logarithm implementation of perfect zero-knowledge blobsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeEfficient signature generation by smart cardsPractic zero-knowledge proofs: Giving hints and using deficienciesDistributed user identification by zero-knowledge access rights provingAn interactive identification scheme based on discrete logarithms and factoringOn Schnorr's preprocessing for digital signature schemesWhat security can we achieve within 4 rounds?Cryptography based on number fields with large regulatorProgrammable Hash Functions and Their ApplicationsBreaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningThe Power of Anonymous Veto in Public DiscussionSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeMore efficient digital signatures with tight multi-user securityConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsUnnamed ItemBlinding for Unanticipated SignaturesConstant-round perfect zero-knowledge computationally convincing protocols