scientific article; zbMATH DE number 2009971
From MaRDI portal
Publication:4434890
zbMath1038.94553MaRDI QIDQ4434890
Hovav Shacham, Craig Gentry, Ben Lynn, Dan Boneh
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560416.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (only showing first 100 items - show all)
Compact ring signatures from learning with errors ⋮ Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures ⋮ Revocable and Linkable Ring Signature ⋮ Another Look at Tightness ⋮ MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature ⋮ Structure-preserving signatures and commitments to group elements ⋮ Key-insulated aggregate signature ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles ⋮ Multi-designated verifiers signatures: anonymity without encryption ⋮ A quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster state ⋮ LOVE a pairing ⋮ Practical post-quantum few-time verifiable random function with applications to Algorand ⋮ Unconditionally anonymous ring and mesh signatures ⋮ Constant-size structure-preserving signatures: generic constructions and simple assumptions ⋮ Delegation with supervision ⋮ Robust subgroup multi-signatures for consensus ⋮ Constant Size Ring Signature Without Random Oracle ⋮ A New Public Remote Integrity Checking Scheme with User Privacy ⋮ Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases ⋮ Practical non-interactive publicly verifiable secret sharing with thousands of parties ⋮ Certificateless aggregate signature scheme secure against fully chosen-key attacks ⋮ A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes ⋮ Efficient traceable ring signature scheme without pairings ⋮ Batch verification of short signatures ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ How to Generate and Use Universal Samplers ⋮ Cloud data auditing with designated verifier ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature ⋮ A novel scheme of anonymous authentication on trust in pervasive social networking ⋮ An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks ⋮ Polynomial approximation of bilinear Diffie-Hellman maps ⋮ Secure proxy signature schemes for delegation of signing rights ⋮ Privacy preserving multi-party computation delegation for deep learning in cloud computing ⋮ Non-interactive multisignatures in the plain public-key model with efficient verification ⋮ FAS: forward secure sequential aggregate signatures for secure logging ⋮ Group-oriented fair exchange of signatures ⋮ On the security of some aggregate signature schemes ⋮ Attribute-based optimistic fair exchange: how to restrict brokers with policies ⋮ Unrestricted and compact certificateless aggregate signature scheme ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ Cryptanalysis and improvement of three certificateless aggregate signature schemes ⋮ A simple transitive signature scheme for directed trees ⋮ Certificate-based verifiably encrypted signatures from pairings ⋮ Nested cover-free families for unbounded fault-tolerant aggregate signatures ⋮ Sequential aggregate signatures with lazy verification from trapdoor permutations ⋮ Optimistic fair exchange in the enhanced chosen-key model ⋮ Ambiguous optimistic fair exchange: definition and constructions ⋮ A t-out-of-n Redactable Signature Scheme ⋮ Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Hybrid proxy multisignature: a new type multi-party signature ⋮ Practical verifiably encrypted signatures without random oracles ⋮ Secure Authenticated Comparisons ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Security of BLS and BGLS signatures in a multi-user setting ⋮ An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks ⋮ Indifferentiable deterministic hashing to elliptic and hyperelliptic curves ⋮ Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Cryptanalysis and improvement of a certificateless aggregate signature scheme ⋮ An efficient ring signature scheme from pairings ⋮ Rogue-key attacks on the multi-designated verifiers signature scheme ⋮ Comparing two pairing-based aggregate signature schemes ⋮ Sequential Aggregate Signatures and Multisignatures Without Random Oracles ⋮ Blockchain-based two-party fair contract signing scheme ⋮ On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited ⋮ Ambiguous Optimistic Fair Exchange ⋮ Sanitizable and Deletable Signature ⋮ Zero-Knowledge Authenticated Order Queries and Order Statistics on a List ⋮ Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Insecurity of an efficient certificateless aggregate signature with constant pairing computations ⋮ Certificateless threshold ring signature ⋮ Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud ⋮ Short fail-stop signature scheme based on factorization and discrete logarithm assumptions ⋮ Tell me the truth: practically public authentication for outsourced databases with multi-user modification ⋮ Aggregate signature protocol with group leader ⋮ Breaking the short certificateless signature scheme ⋮ Practical Short Signature Batch Verification ⋮ Deterministic Encoding into Twisted Edwards Curves ⋮ Fair Threshold Decryption with Semi-Trusted Third Parties ⋮ Security of Verifiably Encrypted Signatures and a Construction without Random Oracles ⋮ Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model ⋮ Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures ⋮ Universal proxy re-encryption ⋮ Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees ⋮ Ring signatures: Stronger definitions, and constructions without random oracles ⋮ Security proofs for identity-based identification and signature schemes ⋮ Optimal Security Proofs for Signatures from Identification Schemes ⋮ On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham ⋮ Towards Security Notions for White-Box Cryptography ⋮ Designated Confirmer Signatures with Unified Verification ⋮ Simple Schnorr multi-signatures with applications to bitcoin ⋮ Still wrong use of pairings in cryptography ⋮ A secure cross-chain transaction model based on quantum multi-signature ⋮ Sequential aggregate signatures with short public keys without random oracles ⋮ ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption ⋮ Indifferentiable hashing to ordinary elliptic \(\mathbb{F}_{q} \)-curves of \(j=0\) with the cost of one exponentiation in \(\mathbb{F}_{q} \)
Uses Software
This page was built for publication: