Group Signatures
From MaRDI portal
Publication:4037470
DOI10.1007/3-540-46416-6_22zbMath0791.68044OpenAlexW4205092462MaRDI QIDQ4037470
Publication date: 18 May 1993
Published in: Advances in Cryptology — EUROCRYPT ’91 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-46416-6_22
Related Items (only showing first 100 items - show all)
Group Signatures with Decentralized Tracing ⋮ Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability ⋮ Low-Cost Cryptography for Privacy in RFID Systems ⋮ Off-Line Group Signatures with Smart Cards ⋮ Group-Based Source-Destination Verifiable Encryption with Blacklist Checking ⋮ Generic Framework for Attribute-Based Group Signature ⋮ Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions ⋮ Unconditionally Anonymous Controllable ID-Based Ring Signatures ⋮ Group signature scheme based on verifiable random number ⋮ Constant Size Ring Signature Without Random Oracle ⋮ Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications ⋮ Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy ⋮ Privacy-preserving blueprints ⋮ Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party ⋮ Tracing a linear subspace: application to linearly-homomorphic group signatures ⋮ PAPR: publicly auditable privacy revocation for anonymous credentials ⋮ End-to-end secure messaging with traceability only for illegal content ⋮ Multimodal private signatures ⋮ Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation ⋮ Anonymous yet Traceable Strong Designated Verifier Signature ⋮ A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation ⋮ Ring signatures with user-controlled linkability ⋮ DualDory: logarithmic-verifier linkable ring signatures through preprocessing ⋮ NIZK from SNARGs ⋮ Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors ⋮ Attribute based tracing for securing group signatures against centralized authorities ⋮ A note on the post-quantum security of (ring) signatures ⋮ Anonymous authenticated communication ⋮ Lattice signature with efficient protocols, application to anonymous credentials ⋮ Improving the efficiency of report and trace ring signatures ⋮ A new lattice-based online/offline signatures framework for low-power devices ⋮ Hierarchical Attribute-Based Signatures ⋮ Compact Ring Signature in the Standard Model for Blockchain ⋮ Threshold signatures with private accountability ⋮ Traceable policy-based signatures and instantiation from lattices ⋮ Efficient code-based fully dynamic group signature scheme ⋮ A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority ⋮ A New Efficient Threshold Ring Signature Scheme Based on Coding Theory ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Anonymous Proxy Signatures ⋮ Fully Anonymous Group Signatures Without Random Oracles ⋮ Group Encryption ⋮ Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease ⋮ Self-organized Anonymous Authentication in Mobile Ad Hoc Networks ⋮ QUANTUM PROXY GROUP SIGNATURE SCHEME WITH χ-TYPE ENTANGLED STATES ⋮ Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications ⋮ One-Shot Verifiable Encryption from Lattices ⋮ A New Dynamic Code-Based Group Signature Scheme ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Compact Group Signatures Without Random Oracles ⋮ Fair Traceable Multi-Group Signatures ⋮ Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures ⋮ Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment ⋮ Byzantine agreement with homonyms ⋮ On the Theoretical Gap between Group Signatures with and without Unlinkability ⋮ Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures ⋮ Forward-Secure Group Signatures from Pairings ⋮ Efficient Traceable Signatures in the Standard Model ⋮ Digital Signatures ⋮ Real Hidden Identity-Based Signatures ⋮ Survey of Lattice-Based Group Signature ⋮ A Practical Group Signature Scheme Based on Rank Metric ⋮ EPID with malicious revocation ⋮ A scalable post-quantum hash-based group signature ⋮ Structure-preserving signatures and commitments to group elements ⋮ Comments on two group signatures ⋮ A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure ⋮ Witness authenticating NIZKs and applications ⋮ Compressing proofs of \(k\)-out-of-\(n\) partial knowledge ⋮ LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication ⋮ Policy-based signature scheme from lattices ⋮ Stronger notions and a more efficient construction of threshold ring signatures ⋮ Unconditionally anonymous ring and mesh signatures ⋮ One-time traceable ring signatures ⋮ \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme ⋮ Report and trace ring signatures ⋮ Selectively linkable group signatures -- stronger security and preserved verifiability ⋮ Security analysis of DGM and GM group signature schemes instantiated with XMSS-T ⋮ Skipping the \(q\) in group signatures ⋮ Anonymous Authentication with Spread Revelation ⋮ Step-out group signatures ⋮ A new ring signature scheme with signer-admission property ⋮ Logarithmic-size ring signatures with tight security from the DDH assumption ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Efficient traceable ring signature scheme without pairings ⋮ Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability ⋮ How to Leak a Secret and Reap the Rewards Too ⋮ On tightly-secure (linkable) ring signatures ⋮ More efficient construction of anonymous signatures ⋮ Simple-Yet-Efficient Construction and Revocation of Group Signatures ⋮ A third-party E-payment protocol based on quantum group blind signature ⋮ Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ Towards Certificate-Based Group Encryption ⋮ A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states ⋮ Efficient democratic group signatures with threshold traceability ⋮ An inter-bank e-payment protocol based on quantum proxy blind signature ⋮ A novel scheme of anonymous authentication on trust in pervasive social networking
This page was built for publication: Group Signatures