Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme

From MaRDI portal
Publication:4414696


DOI10.1007/3-540-36288-6_3zbMath1033.94552MaRDI QIDQ4414696

Alexandra Boldyreva

Publication date: 27 July 2003

Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36288-6_3


94A62: Authentication, digital signatures and secret sharing


Related Items

Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Non-Interactive Key Exchange, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Equivocal Blind Signatures and Adaptive UC-Security, Efficient Sequential Aggregate Signed Data, Separation Results on the “One-More” Computational Problems, Round-Optimal Blind Signatures from Waters Signatures, Discrete logarithm problems with auxiliary inputs, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, New results and applications for multi-secret sharing schemes, Efficient oblivious transfers with access control, Provably secure randomized blind signature scheme based on bilinear pairing, Certificateless threshold signature scheme from bilinear maps, An enhanced \((t,n)\) threshold directed signature scheme, Non-interactive identity-based threshold signature scheme without random oracles, Rogue-key attacks on the multi-designated verifiers signature scheme, Security proofs for identity-based identification and signature schemes, New identity-based society oriented signature schemes from pairings on elliptic curves, Private set-intersection with common set-up, Non-interactive multisignatures in the plain public-key model with efficient verification, Verifiable threshold quantum secret sharing with sequential communication, Sequential aggregate signatures with short public keys without random oracles, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Security of blind signatures revisited, Hybrid proxy multisignature: a new type multi-party signature, Protection of mobile location privacy by using blind signature, Forward-secure multisignature and blind signature schemes, Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption, Communication-Optimal Proactive Secret Sharing for Dynamic Groups, Virtual Smart Cards: How to Sign with a Password and a Server, Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions, A strong designated verifier signature scheme tightly related to the LRSW assumption, Subgroup Security in Pairing-Based Cryptography, Security Analysis of the Strong Diffie-Hellman Problem, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, One-Round ID-Based Blind Signature Scheme without ROS Assumption, Another look at non-standard discrete log and Diffie-Hellman problems, ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG, Public Verifiability from Pairings in Secret Sharing Schemes