Publication:4409137

From MaRDI portal


zbMath1026.94544MaRDI QIDQ4409137

Emmanuel Bresson, Michael Szydlo, Jacques Stern

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm


94A62: Authentication, digital signatures and secret sharing


Related Items

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Extendable threshold ring signatures with enhanced anonymity, Multi-signatures for ECDSA and its applications in blockchain, Efficient proofs of knowledge for threshold relations, Count me in! Extendability for threshold ring signatures, Logarithmic-size (linkable) threshold ring signatures in the plain model, Threshold signatures with private accountability, Unconditionally anonymous ring and mesh signatures, A multivariate based threshold ring signature scheme, An efficient ring signature scheme from pairings, Certificate-free \textit{ad hoc} anonymous authentication, Certificateless threshold ring signature, A new ring signature scheme with signer-admission property, Hidden attribute-based signatures without anonymity revocation, The ring authenticated encryption scheme-how to provide a clue wisely, Ring signatures: Stronger definitions, and constructions without random oracles, Leakage-resilient ring signature schemes, Identity-based quotable ring signature, Policy controlled system with anonymity, Threshold ring signatures: new definitions and post-quantum security, Compressing proofs of \(k\)-out-of-\(n\) partial knowledge, Stronger notions and a more efficient construction of threshold ring signatures, One-time traceable ring signatures, Logarithmic-size ring signatures with tight security from the DDH assumption, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, Efficient traceable ring signature scheme without pairings, Two new identity-based threshold ring signature schemes, Identity-based ring signatures from RSA, Collusion-resistant convertible ring signature schemes, Cryptanalysis of multivariate threshold ring signature schemes, Non-interactive composition of sigma-protocols via Share-then-Hash, Acyclicity programming for sigma-protocols, Short Attribute-Based Signatures for Threshold Predicates, How to Leak a Secret and Reap the Rewards Too, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory