Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme

From MaRDI portal
Publication:4414696

DOI10.1007/3-540-36288-6_3zbMath1033.94552OpenAlexW2167882086MaRDI QIDQ4414696

Alexandra Boldyreva

Publication date: 27 July 2003

Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36288-6_3




Related Items (92)

Two-round trip Schnorr multi-signatures via delinearized witnessesMuSig2: simple two-round Schnorr multi-signaturesRound Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature CompressionBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesFast isomorphic state channelsAdaptively secure threshold symmetric-key encryptionRobust subgroup multi-signatures for consensusSecurity of blind signatures revisitedA fast and simple partially oblivious PRF, with applicationsShort pairing-free blind signatures with exponential securityProvably secure randomized blind signature scheme based on bilinear pairingSubgroup Security in Pairing-Based CryptographyKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeBoosting the Security of Blind Signature SchemesCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesThe One-More Discrete Logarithm Assumption in the Generic Group ModelChain Reductions for Multi-signatures and the HBMS SchemeAnonymous tokens with public metadata and applications to private contact tracingPlumo: an ultralight blockchain clientA verifiable framework of entanglement-free quantum secret sharing with information-theoretical securityBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partySecurity analysis of RSA-BSSANew results and applications for multi-secret sharing schemesChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsThreshold and multi-signature schemes from linear hash functionsNon-interactive blind signatures for random messagesRai-Choo! Evolving blind signatures to the next levelCertificateless threshold signature scheme from bilinear mapsLocally verifiable signature and key aggregationMulti-signatures for ECDSA and its applications in blockchainPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreOn pairing-free blind signature schemes in the algebraic group modelBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsBetter than advertised security for non-interactive threshold signaturesThreshold signatures with private accountabilityNon-interactive multisignatures in the plain public-key model with efficient verificationFully adaptive Schnorr threshold signaturesSnowblind: a threshold blind signature in pairing-free groupsPractical Schnorr threshold signatures without the algebraic group modelOn the Amortized Communication Complexity of Byzantine BroadcastOblivious pseudorandom functions from isogeniesOrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit lossEfficient oblivious transfers with access controlBlind Identity-Based Encryption and Simulatable Oblivious TransferNon-interactive identity-based threshold signature scheme without random oraclesHybrid proxy multisignature: a new type multi-party signatureIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesVerifiable threshold quantum secret sharing with sequential communicationNon-Interactive Key ExchangeSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesRogue-key attacks on the multi-designated verifiers signature schemeNew identity-based society oriented signature schemes from pairings on elliptic curvesSecurity Analysis of the Strong Diffie-Hellman ProblemSequential Aggregate Signatures and Multisignatures Without Random OraclesOne-Round ID-Based Blind Signature Scheme without ROS AssumptionPrivate set-intersection with common set-upRe-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-EncryptionEquivocal Blind Signatures and Adaptive UC-SecurityCommunication-Optimal Proactive Secret Sharing for Dynamic GroupsProtection of mobile location privacy by using blind signatureAn enhanced \((t,n)\) threshold directed signature schemeMulti-theorem preprocessing NIZKs from latticesAnother look at non-standard discrete log and Diffie-Hellman problemsDiscrete logarithm problems with auxiliary inputsEfficient Sequential Aggregate Signed DataSeparation Results on the “One-More” Computational ProblemsOn the (in)security of ROSOn the (in)security of ROSID-Based Blind Signature and Proxy Blind Signature without Trusted PKGThreshold ring signatures: new definitions and post-quantum securityAggregatable distributed key generationRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsAn efficient blind signature scheme based on SM2 signature algorithmTwo-party adaptor signatures from identification schemesBETA: biometric-enabled threshold authenticationIdentity-based encryption with security against the KGC: a formal model and its instantiationsVirtual Smart Cards: How to Sign with a Password and a ServerPractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsPublic Verifiability from Pairings in Secret Sharing SchemesSecurity proofs for identity-based identification and signature schemesThreshold-directed signature scheme based on hybrid number theoretic problemsSimple Schnorr multi-signatures with applications to bitcoinRound-Optimal Blind Signatures from Waters SignaturesForward-secure multisignature and blind signature schemesEfficient Round-Optimal Blind Signatures in the Standard ModelAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersAnonymous tokens with private metadata bitLattice-based blind signatures, revisitedSequential aggregate signatures with short public keys without random oraclesA strong designated verifier signature scheme tightly related to the LRSW assumptionBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model




This page was built for publication: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme