scientific article; zbMATH DE number 1942446

From MaRDI portal
Publication:4409145

zbMath1028.94511MaRDI QIDQ4409145

Anna Lysyanskaya

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420597.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (34)

On the security loss of unique signaturesMercurial commitments with applications to zero-knowledge setsShielded computations in smart contracts overcoming forksPractical post-quantum few-time verifiable random function with applications to AlgorandMemory lower bounds of reductions revisitedA Novel Certificateless Multi-signature Scheme over NTRU LatticesThe random oracle model: a twenty-year retrospectiveExplainable argumentsA novel identity-based multi-signature scheme over NTRU latticesCliptography: Clipping the Power of Kleptographic AttacksFrom Identification to Signatures, Tightly: A Framework and Generic TransformsCertificateless key-insulated signature without random oraclesPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessMultiparty non-interactive key exchange and more from isogenies on elliptic curvesEncapsulated search index: public-key, sub-linear, distributed, and delegatableLogarithmic-size (linkable) threshold ring signatures in the plain modelAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsThe price of verifiability: lower bounds for verifiable random functionsSimulatable verifiable random function from the LWE assumptionOn the impossibility of structure-preserving deterministic primitivesKDM security for identity-based encryption: constructions and separationsCertificate-Based Signature Schemes without Pairings or Random OraclesEfficient selective identity-based encryption without random oraclesSeveral cryptographic applications of \(\Sigma\)-protocolSubversion-resilient signatures: definitions, constructions and applicationsVerifiable random functions from non-interactive witness-indistinguishable proofsVerifiable Random Functions from Standard AssumptionsVerifiable random functions: relations to identity-based key encapsulation and new constructionsVerifiable Random Functions from Identity-Based Key EncapsulationImpossibility on tamper-resilient cryptography with uniqueness propertiesTwo-party adaptor signatures from identification schemesEfficient Rational Secret Sharing in Standard Communication NetworksComputing on authenticated dataPseudorandom Functions: Three Decades Later




This page was built for publication: