scientific article; zbMATH DE number 1942446
From MaRDI portal
Publication:4409145
Recommendations
- Unique signature with short output from CDH assumption
- Efficient Construction of (Distributed) Verifiable Random Functions
- Verifiable random functions from weaker assumptions
- Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
- Public Key Cryptography - PKC 2005
Cited in
(38)- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- KDM security for identity-based encryption: constructions and separations
- Subversion-resilient signatures: definitions, constructions and applications
- The price of verifiability: lower bounds for verifiable random functions
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Efficient selective identity-based encryption without random oracles
- Computing on authenticated data
- On the security loss of unique signatures
- Memory lower bounds of reductions revisited
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Explainable arguments
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- Shielded computations in smart contracts overcoming forks
- Practical post-quantum few-time verifiable random function with applications to Algorand
- Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
- A novel certificateless multi-signature scheme over NTRU lattices
- The random oracle model: a twenty-year retrospective
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- Cliptography: clipping the power of kleptographic attacks
- Several cryptographic applications of \(\Sigma\)-protocol
- Pseudorandom functions: three decades later
- Verifiable random functions from standard assumptions
- Unique signature with short output from CDH assumption
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Unbiasable verifiable random functions
- A novel identity-based multi-signature scheme over NTRU lattices
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Two-party adaptor signatures from identification schemes
- Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
- Traceable secret sharing: strong security and efficient constructions
- Mercurial commitments with applications to zero-knowledge sets
- Efficient rational secret sharing in standard communication networks
- On the impossibility of structure-preserving deterministic primitives
- Simulatable verifiable random function from the LWE assumption
- Certificateless key-insulated signature without random oracles
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4409145)