scientific article; zbMATH DE number 2009983

From MaRDI portal
Publication:4434902

zbMath1038.94552MaRDI QIDQ4434902

Bogdan Warinschi, Daniele Micciancio, Mihir Bellare

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560614.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

EPID with malicious revocationCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsA scalable post-quantum hash-based group signatureStructure-preserving signatures and commitments to group elementsOff-Line Group Signatures with Smart CardsGeneric Framework for Attribute-Based Group SignatureImplementing secure reporting of sexual misconduct -- revisiting WhoTooConstant-size structure-preserving signatures: generic constructions and simple assumptions\textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature schemeReport and trace ring signaturesSelectively linkable group signatures -- stronger security and preserved verifiabilitySecurity analysis of DGM and GM group signature schemes instantiated with XMSS-TVetted encryptionSkipping the \(q\) in group signaturesSubversion-resilient enhanced privacy IDStep-out group signaturesA rank metric code-based group signature schemeAnonymous single-sign-on for \(n\) designated services with traceabilityGroup signatures and more from isogenies and lattices: generic, simple, and efficientToward non-interactive zero-knowledge proofs for NP from LWEEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityMore efficient construction of anonymous signaturesLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyPrivacy-preserving blueprintsTracing a linear subspace: application to linearly-homomorphic group signaturesSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesUnlinkable policy-based sanitizable signaturesEnd-to-end secure messaging with traceability only for illegal contentMultimodal private signaturesTraceable Identity-Based Group SignatureAchieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsAnonymous yet Traceable Strong Designated Verifier SignatureRing signatures with user-controlled linkabilityNIZK from SNARGsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsAttribute based tracing for securing group signatures against centralized authoritiesTraceable constant-size multi-authority credentialsImprovements on non-interactive zero-knowledge proof systems related to quadratic residuosity languagesTraceable constant-size multi-authority credentialsTriply adaptive UC NIZKA framework for practical anonymous credentials from latticesThreshold signatures with private accountabilityA note on non-interactive zero-knowledge from CDHEfficient traceable signatures in the standard modelTraceable policy-based signatures and instantiation from latticesEfficient code-based fully dynamic group signature schemePractical dynamic group signatures without knowledge extractorsA CCA-full-anonymous group signature with verifiable controllable linkability in the standard modelFoundations of fully dynamic group signaturesOn the impossibility of structure-preserving deterministic primitivesPrivacy Preserving Data Mining within Anonymous Credential SystemsAnonymous Proxy SignaturesFully Anonymous Group Signatures Without Random OraclesGroup EncryptionLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseAlmost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptionsA code-based group signature schemeA decentralized group signature scheme for privacy protection in a blockchainA lattice-based group signature scheme with verifier-local revocationLeakage-resilient group signature: definitions and constructionsAn efficient ring signature scheme from pairingsA New Dynamic Code-Based Group Signature SchemeList signature schemesHidden attribute-based signatures without anonymity revocationA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s ReputationGroup signatures and more from isogenies and lattices: generic, simple, and efficientCompact Group Signatures Without Random OraclesSequential Aggregate Signatures and Multisignatures Without Random OraclesConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisAttribute-Based SignaturesCompact designated verifier NIZKs from the CDH assumption without pairingsAnonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsPrivacy-preserving authenticated key exchange and the case of IKEv2Non-interactive zero knowledge from sub-exponential DDHBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeOn the Theoretical Gap between Group Signatures with and without UnlinkabilityFoundations of Fully Dynamic Group SignaturesA Lattice-Based Group Signature Scheme with Message-Dependent OpeningProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionForward-Secure Group Signatures from PairingsEfficient Traceable Signatures in the Standard ModelGroup encryption: full dynamicity, message filtering and code-based instantiationRing signatures: Stronger definitions, and constructions without random oraclesBatch RSA signature schemeLattice-based group signatures: achieving full dynamicity (and deniability) with easeOn the security of Miyaji et al. group signature schemeAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersSurvey of Lattice-Based Group SignatureAnonymous tokens with private metadata bitComputing on authenticated dataNIZK from LPN and trapdoor hash via correlation intractability for approximable relationsNon-interactive zero-knowledge arguments for QMA, with preprocessingA Practical Group Signature Scheme Based on Rank Metric