scientific article; zbMATH DE number 2009971
From MaRDI portal
Publication:4434890
zbMATH Open1038.94553MaRDI QIDQ4434890FDOQ4434890
Authors: Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560416.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (only showing first 100 items - show all)
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Attribute-based optimistic fair exchange: how to restrict brokers with policies
- Rogue-key attacks on the multi-designated verifiers signature scheme
- Boneh et al.'s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption
- Batch verification of short signatures
- Certificateless threshold ring signature
- Proxy Signatures Secure Against Proxy Key Exposure
- Locally verifiable signature and key aggregation
- Security proofs for identity-based identification and signature schemes
- Polynomial approximation of bilinear Diffie-Hellman maps
- Practical Short Signature Batch Verification
- Breaking the short certificateless signature scheme
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Optimal security proofs for signatures from identification schemes
- Revocable and linkable ring signature
- One-shot verifiable encryption from lattices
- Multi-key Hierarchical Identity-Based Signatures
- Multi-designated verifiers signatures: anonymity without encryption
- Structure-preserving signatures and commitments to group elements
- Group-oriented fair exchange of signatures
- Advances in Cryptology – CRYPTO 2004
- Certificate-free \textit{ad hoc} anonymous authentication
- Insecurity of an efficient certificateless aggregate signature with constant pairing computations
- Fully Anonymous Group Signatures Without Random Oracles
- Hybrid proxy multisignature: a new type multi-party signature
- Secure proxy signature schemes for delegation of signing rights
- Key-insulated aggregate signature
- Simple Schnorr multi-signatures with applications to bitcoin
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
- FAS: forward secure sequential aggregate signatures for secure logging
- Public Key Cryptography - PKC 2006
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
- Efficient traceable ring signature scheme without pairings
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- Unconditionally anonymous ring and mesh signatures
- Cryptanalysis and improvement of three certificateless aggregate signature schemes
- Cloud data auditing with designated verifier
- On the security of some aggregate signature schemes
- Efficient Sequential Aggregate Signed Data
- A simple transitive signature scheme for directed trees
- Sequential aggregate signatures with lazy verification from trapdoor permutations
- Ambiguous optimistic fair exchange: definition and constructions
- Optimistic fair exchange in the enhanced chosen-key model
- Practical verifiably encrypted signatures without random oracles
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- Ring signatures: Stronger definitions, and constructions without random oracles
- Another look at tightness
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Comparing two pairing-based aggregate signature schemes
- Ambiguous Optimistic Fair Exchange
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- Certificateless aggregate signature scheme secure against fully chosen-key attacks
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Notes on the security of certificateless aggregate signature schemes
- Certificate-based verifiably encrypted signatures from pairings
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Security of BLS and BGLS signatures in a multi-user setting
- Cryptanalysis and improvement of a certificateless aggregate signature scheme
- An efficient ring signature scheme from pairings
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- NIWI and new notions of extraction for algebraic languages
- How to Generate and Use Universal Samplers
- A secure cross-chain transaction model based on quantum multi-signature
- ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability
- Predicate aggregate signatures and applications
- Tell me the truth: practically public authentication for outsourced databases with multi-user modification
- QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain
- Fair Threshold Decryption with Semi-Trusted Third Parties
- Sequential aggregate signatures with short public keys: design, analysis and implementation studies
- Still wrong use of pairings in cryptography
- McFly: verifiable encryption to the future made practical
- Indifferentiable hashing to ordinary elliptic \(\mathbb{F}_{q} \)-curves of \(j=0\) with the cost of one exponentiation in \(\mathbb{F}_{q} \)
- Improved extension protocols for Byzantine broadcast and agreement
- Extendable threshold ring signatures with enhanced anonymity
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- Sequential aggregate signatures with short public keys without random oracles
- A t-out-of-n Redactable Signature Scheme
- A quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster state
- Plumo: an ultralight blockchain client
- SoK: blockchain light clients
- Sanitizable and Deletable Signature
- Pointcheval-Sanders signature-based synchronized aggregate signature
- Deterministic encoding into twisted Edwards curves
- Optimal Online/Offline Signature: How to Sign a Message without Online Computation
- Blockchain-based two-party fair contract signing scheme
- Universal ring signatures in the standard model
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Practical post-quantum few-time verifiable random function with applications to Algorand
- A survey of cover-free families: constructions, applications, and generalizations
- Strongly anonymous ratcheted key exchange
- LOVE a pairing
Uses Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434890)