scientific article; zbMATH DE number 1088224

From MaRDI portal
Publication:4364540

zbMath0880.94007MaRDI QIDQ4364540

Tatsuaki Okamoto, Eiichiro Fujisaki

Publication date: 10 February 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (53)

Short Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentZero-knowledge proofs for set membership: efficient, succinct, modularNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelA verifiable secret shuffle of homomorphic encryptionsSignatures and Efficient Proofs on Committed Graphs and NP-StatementsPrivacy-preserving blueprintsZero-knowledge arguments for subverted RSA groupsEfficient RSA key generation and threshold Paillier in the two-party settingUniversally composable \(\varSigma \)-protocols in the global random-oracle modelHow (not) to design strong-RSA signaturesSuccinct Diophantine-satisfiability argumentsProgrammable hash functions and their applicationsPartial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier PolynomialOn the tightness of forward-secure signature reductionsProperty-Based Attestation without a Trusted Third PartyPrivacy-Preserving Similarity Evaluation and Application to Remote Biometrics AuthenticationSecure Authenticated ComparisonsRemoving the Strong RSA Assumption from Arguments over the IntegersThe RSA group is pseudo-freeA Framework for Constructing Convertible Undeniable SignaturesA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Group signatures and more from isogenies and lattices: generic, simple, and efficientZero-knowledge proofs for set membership: efficient, succinct, modularEfficient Binary Conversion for Paillier Encrypted ValuesProgrammable Hash Functions and Their ApplicationsSecure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesEfficient Protocols for Set Membership and Range ProofsCryptographic Assumptions: A Position PaperA General, Flexible and Efficient Proof of Inclusion and ExclusionStatistically Hiding SetsOn the Portability of Generalized Schnorr ProofsOn the amortized complexity of zero-knowledge protocolsTransparent SNARKs from DARK compilersA Commitment-Consistent Proof of a ShuffleBreaking RSA Generically Is Equivalent to FactoringEfficient range proofs with transparent setup from bounded integer commitmentsNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityFilling the gap between voters and cryptography in e-votingEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesEncryption Switching ProtocolsEfficient, Robust and Constant-Round Distributed RSA Key GenerationEfficiency Limitations for Σ-Protocols for Group HomomorphismsA new scale-invariant homomorphic encryption schemeAn Efficient On-Line/Off-Line Signature Scheme without Random OraclesA Verifiable Secret Sharing Scheme Based on the Chinese Remainder TheoremOn the security of Miyaji et al. group signature schemeProxy signature scheme using self-certified public keysTwo-sided malicious security for private intersection-sum with cardinalityCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmicsAugmented Oblivious Polynomial Evaluation Protocol and Its Applications




This page was built for publication: