scientific article; zbMATH DE number 1088250
From MaRDI portal
Publication:4364567
zbMATH Open0882.94018MaRDI QIDQ4364567FDOQ4364567
Authors: Jan Camenisch, Markus A. Stadler
Publication date: 10 March 1998
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 1302792
- scientific article; zbMATH DE number 1088912
- Publication:4941871
- An efficient undeniable group-oriented signature scheme
- scientific article; zbMATH DE number 2058683
- Group Signatures: Better Efficiency and New Theoretical Aspects
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1487951
Cited In (only showing first 100 items - show all)
- Ring signatures with user-controlled linkability
- SKC-CCCO: an encryption algorithm for quantum group signature
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the Portability of Generalized Schnorr Proofs
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- Leakage-resilient group signature: definitions and constructions
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- Set signatures and their applications
- Extending concurrent signature to multiple parties
- Expressive Subgroup Signatures
- Escrow free attribute-based signature with self-revealability
- Fair Traceable Multi-Group Signatures
- Efficient Protocols for Set Membership and Range Proofs
- Structure-preserving signatures and commitments to group elements
- Information Security and Privacy
- Provably secure fair mutual private set intersection cardinality utilizing Bloom filter
- New realizations of efficient and secure private set intersection protocols preserving fairness
- Group Signatures with Efficient Concurrent Join
- Security in Communication Networks
- Delegating a product of group exponentiations with application to signature schemes
- Secure and efficient multiparty private set intersection cardinality
- Compact E-Cash and Simulatable VRFs Revisited
- Unique group signatures
- FAST: fair auctions via secret transactions
- Blind attribute-based encryption and oblivious transfer with fine-grained access control
- A novel quantum group signature scheme without using entangled states
- An efficient self-blindable attribute-based credential scheme
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Efficient group signatures in the standard model
- Title not available (Why is that?)
- Time-selective convertible undeniable signatures with short conversion receipts
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- Issuer-hiding attribute-based credentials
- Report and trace ring signatures
- Improved signature schemes for secure multi-party computation with certified inputs
- Advances in Cryptology - EUROCRYPT 2004
- Aggregate signature protocol with group leader
- A traceable group signature scheme.
- UC-secure and contributory password-authenticated group key exchange
- Efficient group signatures without trapdoors
- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
- Selectively linkable group signatures -- stronger security and preserved verifiability
- Anonymous single-sign-on for \(n\) designated services with traceability
- Bandwidth-efficient threshold EC-DSA
- Collective signature protocols for signing groups
- Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security
- Group Encryption
- Foundations of fully dynamic group signatures
- Publicly Verifiable Privacy-Preserving Group Decryption
- Two-sided malicious security for private intersection-sum with cardinality
- Interpolation of the Double Discrete Logarithm
- Generalizing efficient multiparty computation
- A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model
- Collusion-resistant convertible ring signature schemes
- Universally composable \(\varSigma \)-protocols in the global random-oracle model
- On the Theoretical Gap between Group Signatures with and without Unlinkability
- A novel ID-based group signature
- Sanitizable Signatures Revisited
- Improved algebraic MACs and practical keyed-verification anonymous credentials
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- On the security of Miyaji et al. group signature scheme
- Counting fixed points and rooted closed walks of the singular map \(x \mapsto x^{x^n}\) modulo powers of a prime
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem
- Title not available (Why is that?)
- Public cloud data auditing with practical key update and zero knowledge privacy
- Accumulating composites and improved group signing
- Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability
- Title not available (Why is that?)
- Universally Composable Adaptive Priced Oblivious Transfer
- An efficient ring signature scheme from pairings
- Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
- Applied Cryptography and Network Security
- NIWI and new notions of extraction for algebraic languages
- A universally composable non-interactive aggregate cash system
- A generic construction of an anonymous reputation system and instantiations from lattices
- Group signature schemes with forward secure properties
- The Power of Anonymous Veto in Public Discussion
- Group signature scheme based on verifiable random number
- Dining cryptographers with 0.924 verifiable collision resolution
- Practical construction for secure trick-taking games even with cards set aside
- Title not available (Why is that?)
- Improving the efficiency of report and trace ring signatures
- A new dynamic group signature scheme
- Zero-knowledge functional elementary databases
- Title not available (Why is that?)
- Anonymous authentication with optional shared anonymity revocation and linkability
- Privacy-preserving blueprints
- \textsf{ECLIPSE}: enhanced compiling method for Pedersen-committed zkSNARK engines
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- Group message authentication
- An efficient and secure navigation protocol based on vehicular cloud
- Title not available (Why is that?)
- Property-Based Attestation without a Trusted Third Party
- Group signature protocol based on masking public keys
- Signatures and efficient proofs on committed graphs and NP-statements
- Towards lightweight anonymous entity authentication for IoT applications
- Asymmetric group message franking: definitions and constructions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364567)