scientific article; zbMATH DE number 1162684

From MaRDI portal
Publication:4394211

zbMath0903.94025MaRDI QIDQ4394211

Ronald Cramer

Publication date: 11 June 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (37)

Non-malleable functions and their applicationsConcurrent knowledge extraction in public-key modelsA compressed \(\varSigma \)-protocol theory for latticesCompressing proofs of \(k\)-out-of-\(n\) partial knowledgeTightly secure signatures from lossy identification schemesLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageAnonymous Authentication with Spread RevelationCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringLogarithmic-size ring signatures with tight security from the DDH assumptionZero-knowledge proofs of knowledge for group homomorphismsAsymmetric group message franking: definitions and constructionsZero-knowledge arguments for subverted RSA groupsAn accurate, scalable and verifiable protocol for federated differentially private averagingTwo-server password-only authenticated key exchangeVector commitments over rings and compressed \(\varSigma \)-protocolsSecure multiparty computation from threshold encryption based on class groupsOn the impossibility of algebraic NIZK in pairing-free groupsNon-interactive composition of sigma-protocols via Share-then-HashAcyclicity programming for sigma-protocolsOn the tightness of forward-secure signature reductionsResource fairness and composability of cryptographic protocolsSeveral cryptographic applications of \(\Sigma\)-protocolA framework for non-interactive instance-dependent commitment schemes (NIC)Secure Authenticated ComparisonsBounded tamper resilience: how to go beyond the algebraic barrierFormalising \(\varSigma\)-protocols and commitment schemes using cryptholImproved OR-Composition of Sigma-ProtocolsExtended security arguments for signature schemesA note on universal composable zero-knowledge in the common reference string modelUnifying Zero-Knowledge Proofs of KnowledgeNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsTowards Restricting Plaintext Space in Public Key EncryptionEfficiency Limitations for Σ-Protocols for Group HomomorphismsCryptographic Voting — A Gentle IntroductionCovert authentication from latticesAdaptively secure distributed public-key systems.Compressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics




This page was built for publication: