scientific article; zbMATH DE number 1942413

From MaRDI portal
Publication:4409110

zbMath1026.94545MaRDI QIDQ4409110

Anna Lysyanskaya, Jan Camenisch

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420061.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Cryptanalysis of a dynamic universal accumulator over bilinear groupsMulti-party revocation in sovrin: performance through distributed trustShort Transitive Signatures for Directed TreesUC Updatable Databases and ApplicationsOff-Line Group Signatures with Smart CardsFiat-Shamir for highly sound protocols is instantiableZero-knowledge proofs for set membership: efficient, succinct, modularA New Approach to Efficient Revocable Attribute-Based Anonymous Credentials\textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature schemeSecurity analysis of DGM and GM group signature schemes instantiated with XMSS-TDynamic universal accumulator with batch update over bilinear groupsCPA-to-CCA transformation for KDM securityMerkle trees optimized for stateless clients in bitcoinLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyLattice-based accumulator with constant time list update and constant time verificationFunctional commitments for all functions, with transparent setup and from SISZero-Knowledge Accumulators and Set AlgebraSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions\textsf{Dew}: a transparent constant-sized polynomial commitment schemeComplex Zero-Knowledge Proofs of Knowledge Are Easy to UseTraceable Identity-Based Group SignatureAchieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationA Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsBlack-box anonymous commit-and-proveLower bounds for the number of decryption updates in registration-based encryptionAdditive-homomorphic functional commitments and applications to homomorphic signaturesEfficient code-based fully dynamic group signature schemeKVaC: key-value commitments for blockchains and beyondCircular security is complete for KDM securityIncrementally aggregatable vector commitments and applications to verifiable decentralized storageNon-malleable vector commitments via local equivocabilityFoundations of fully dynamic group signaturesEfficient oblivious transfers with access controlSelf-organized Anonymous Authentication in Mobile Ad Hoc NetworksA lattice-based group signature scheme with verifier-local revocationVector Commitments and Their ApplicationsEfficient authenticated data structures for graph connectivity and geometric search problemsList signature schemesA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Zero-knowledge proofs for set membership: efficient, succinct, modularCompact Group Signatures Without Random OraclesUnclonable Group IdentificationMulti-Identity Single-Key Decryption without Random OraclesEfficient Protocols for Set Membership and Range ProofsNon-malleable vector commitments via local equivocabilityMutative Identity-Based Signatures or Dynamic Credentials Without Random OraclesSession resumption protocols and efficient forward security for TLS 1.3 0-RTTA General, Flexible and Efficient Proof of Inclusion and ExclusionSuper-Efficient Verification of Dynamic Outsourced DatabasesStatistically Hiding SetsDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsFoundations of Fully Dynamic Group SignaturesGroup encryption: full dynamicity, message filtering and code-based instantiationFiat–Shamir for Highly Sound Protocols Is InstantiableEfficient Asynchronous Accumulators for Distributed PKIUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute TokensLattice-based group signatures: achieving full dynamicity (and deniability) with easeA symmetric cryptographic scheme for data integrity verification in cloud databasesOn the security of Miyaji et al. group signature schemeNew constructions of hinting PRGs, OWFs with encryption, and moreNew code-based cryptographic accumulator and fully dynamic group signature




This page was built for publication: