scientific article; zbMATH DE number 1952906

From MaRDI portal
Publication:4414288

zbMath1022.68528MaRDI QIDQ4414288

Jan Camenisch, Anna Lysyanskaya

Publication date: 24 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2576/25760268.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsUnconditionally anonymous ring and mesh signaturesA New Approach to Efficient Revocable Attribute-Based Anonymous CredentialsBlack-box accumulation based on latticesIssuer-hiding attribute-based credentialsA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionEnforcing input correctness via certification in garbled circuit evaluationAnonymous single-sign-on for \(n\) designated services with traceabilityImproved signature schemes for secure multi-party computation with certified inputsMinimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key ModelImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesLong-term security and universal composabilitySignatures and Efficient Proofs on Committed Graphs and NP-StatementsLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyAnonymous tokens with public metadata and applications to private contact tracingPrivacy-preserving blueprintsZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsRevisiting BBS signaturesRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsTraceable constant-size multi-authority credentialsTraceable constant-size multi-authority credentialsCredential transparency systemLattice signature with efficient protocols, application to anonymous credentialsA framework for practical anonymous credentials from latticesAnonymous tokens with stronger metadata bit hiding from algebraic MACsHierarchical Attribute-Based SignaturesUniversally composable \(\varSigma \)-protocols in the global random-oracle modelImproved algebraic MACs and practical keyed-verification anonymous credentialsHow (not) to design strong-RSA signaturesMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemProgrammable hash functions and their applicationsZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionEfficient oblivious transfers with access controlOn the impossibility of structure-preserving deterministic primitivesGroup EncryptionTowards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard ExtensionsBreaking and Fixing Anonymous Credentials for the CloudSecure Authenticated ComparisonsSubversion-resilient signatures: definitions, constructions and applicationsProgrammable Hash Functions and Their ApplicationsUnlinkable Randomizable Signature and Its Application in Group SignatureEfficient Protocols for Set Membership and Range ProofsPairings in Trusted ComputingConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesRecovering Lost Device-Bound CredentialsTight security for signature schemes without random oraclesFormal Treatment of Privacy-Enhancing Credential SystemsDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsRealizing Hash-and-Sign Signatures under Standard AssumptionsTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsEfficient redactable signature and application to anonymous credentialsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesAn Efficient On-Line/Off-Line Signature Scheme without Random OraclesOn Proofs of Security for DAA SchemesAuthenticated hash tables based on cryptographic accumulators