scientific article; zbMATH DE number 2009983
From MaRDI portal
Publication:4434902
zbMath1038.94552MaRDI QIDQ4434902
Bogdan Warinschi, Daniele Micciancio, Mihir Bellare
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560614.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
EPID with malicious revocation ⋮ Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ A scalable post-quantum hash-based group signature ⋮ Structure-preserving signatures and commitments to group elements ⋮ Off-Line Group Signatures with Smart Cards ⋮ Generic Framework for Attribute-Based Group Signature ⋮ Implementing secure reporting of sexual misconduct -- revisiting WhoToo ⋮ Constant-size structure-preserving signatures: generic constructions and simple assumptions ⋮ \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme ⋮ Report and trace ring signatures ⋮ Selectively linkable group signatures -- stronger security and preserved verifiability ⋮ Security analysis of DGM and GM group signature schemes instantiated with XMSS-T ⋮ Vetted encryption ⋮ Skipping the \(q\) in group signatures ⋮ Subversion-resilient enhanced privacy ID ⋮ Step-out group signatures ⋮ A rank metric code-based group signature scheme ⋮ Anonymous single-sign-on for \(n\) designated services with traceability ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Toward non-interactive zero-knowledge proofs for NP from LWE ⋮ Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability ⋮ More efficient construction of anonymous signatures ⋮ Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy ⋮ Privacy-preserving blueprints ⋮ Tracing a linear subspace: application to linearly-homomorphic group signatures ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones ⋮ Unlinkable policy-based sanitizable signatures ⋮ End-to-end secure messaging with traceability only for illegal content ⋮ Multimodal private signatures ⋮ Traceable Identity-Based Group Signature ⋮ Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation ⋮ Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs ⋮ Anonymous yet Traceable Strong Designated Verifier Signature ⋮ Ring signatures with user-controlled linkability ⋮ NIZK from SNARGs ⋮ Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors ⋮ Attribute based tracing for securing group signatures against centralized authorities ⋮ Traceable constant-size multi-authority credentials ⋮ Improvements on non-interactive zero-knowledge proof systems related to quadratic residuosity languages ⋮ Traceable constant-size multi-authority credentials ⋮ Triply adaptive UC NIZK ⋮ A framework for practical anonymous credentials from lattices ⋮ Threshold signatures with private accountability ⋮ A note on non-interactive zero-knowledge from CDH ⋮ Efficient traceable signatures in the standard model ⋮ Traceable policy-based signatures and instantiation from lattices ⋮ Efficient code-based fully dynamic group signature scheme ⋮ Practical dynamic group signatures without knowledge extractors ⋮ A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model ⋮ Foundations of fully dynamic group signatures ⋮ On the impossibility of structure-preserving deterministic primitives ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Anonymous Proxy Signatures ⋮ Fully Anonymous Group Signatures Without Random Oracles ⋮ Group Encryption ⋮ Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease ⋮ Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions ⋮ A code-based group signature scheme ⋮ A decentralized group signature scheme for privacy protection in a blockchain ⋮ A lattice-based group signature scheme with verifier-local revocation ⋮ Leakage-resilient group signature: definitions and constructions ⋮ An efficient ring signature scheme from pairings ⋮ A New Dynamic Code-Based Group Signature Scheme ⋮ List signature schemes ⋮ Hidden attribute-based signatures without anonymity revocation ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Compact Group Signatures Without Random Oracles ⋮ Sequential Aggregate Signatures and Multisignatures Without Random Oracles ⋮ Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis ⋮ Attribute-Based Signatures ⋮ Compact designated verifier NIZKs from the CDH assumption without pairings ⋮ Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures ⋮ Towards Lightweight Anonymous Entity Authentication for IoT Applications ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Non-interactive zero knowledge from sub-exponential DDH ⋮ Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme ⋮ On the Theoretical Gap between Group Signatures with and without Unlinkability ⋮ Foundations of Fully Dynamic Group Signatures ⋮ A Lattice-Based Group Signature Scheme with Message-Dependent Opening ⋮ Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Forward-Secure Group Signatures from Pairings ⋮ Efficient Traceable Signatures in the Standard Model ⋮ Group encryption: full dynamicity, message filtering and code-based instantiation ⋮ Ring signatures: Stronger definitions, and constructions without random oracles ⋮ Batch RSA signature scheme ⋮ Lattice-based group signatures: achieving full dynamicity (and deniability) with ease ⋮ On the security of Miyaji et al. group signature scheme ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ Survey of Lattice-Based Group Signature ⋮ Anonymous tokens with private metadata bit ⋮ Computing on authenticated data ⋮ NIZK from LPN and trapdoor hash via correlation intractability for approximable relations ⋮ Non-interactive zero-knowledge arguments for QMA, with preprocessing ⋮ A Practical Group Signature Scheme Based on Rank Metric