scientific article; zbMATH DE number 2009983
From MaRDI portal
Publication:4434902
zbMATH Open1038.94552MaRDI QIDQ4434902FDOQ4434902
Authors: M. Bellare, Daniele Micciancio, Bogdan Warinschi
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560614.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- EPID with malicious revocation
- Ring signatures with user-controlled linkability
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Non-interactive zero-knowledge arguments for QMA, with preprocessing
- A scalable post-quantum hash-based group signature
- Leakage-resilient group signature: definitions and constructions
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- Toward non-interactive zero-knowledge proofs for NP from LWE
- Anonymous yet Traceable Strong Designated Verifier Signature
- A lattice-based group signature scheme with verifier-local revocation
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs
- Structure-preserving signatures and commitments to group elements
- Fully Anonymous Group Signatures Without Random Oracles
- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
- Topics in Cryptology – CT-RSA 2005
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Triply adaptive UC NIZK
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
- \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme
- Report and trace ring signatures
- Security analysis of DGM and GM group signature schemes instantiated with XMSS-T
- A rank metric code-based group signature scheme
- Efficient Traceable Signatures in the Standard Model
- A lattice-based group signature scheme with message-dependent opening
- Subversion-resilient enhanced privacy ID
- Skipping the \(q\) in group signatures
- Vetted encryption
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- List signature schemes
- Batch RSA signature scheme
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
- How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
- A decentralized group signature scheme for privacy protection in a blockchain
- Compact privacy protocols from post-quantum and timed classical assumptions
- Selectively linkable group signatures -- stronger security and preserved verifiability
- Anonymous single-sign-on for \(n\) designated services with traceability
- Traceable identity-based group signature
- Efficient traceable signatures in the standard model
- Compact designated verifier NIZKs from the CDH assumption without pairings
- Non-interactive zero knowledge from sub-exponential DDH
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- Group Encryption
- Ring signatures: Stronger definitions, and constructions without random oracles
- Foundations of fully dynamic group signatures
- Attribute-based signatures
- A New Dynamic Code-Based Group Signature Scheme
- Hidden attribute-based signatures without anonymity revocation
- A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model
- Lattice-based group signatures: achieving full dynamicity (and deniability) with ease
- On the Theoretical Gap between Group Signatures with and without Unlinkability
- On the security of Miyaji et al. group signature scheme
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- A code-based group signature scheme
- On the impossibility of structure-preserving deterministic primitives
- Unlinkable policy-based sanitizable signatures
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
- Anonymous tokens with private metadata bit
- A practical group signature scheme based on rank metric
- Anonymous Proxy Signatures
- Compact Group Signatures Without Random Oracles
- An efficient ring signature scheme from pairings
- Foundations of fully dynamic group signatures
- An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation
- Bicameral and auditably private signatures
- Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions
- A framework for practical anonymous credentials from lattices
- Information and Communications Security
- Survey of lattice-based group signature
- Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting
- Computing on authenticated data
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Threshold signatures with private accountability
- Forward-Secure Group Signatures from Pairings
- Privacy-preserving blueprints
- \textsf{ZKAttest}: ring and group signatures for existing ECDSA keys
- Multimodal private signatures
- A note on non-interactive zero-knowledge from CDH
- Tracing a linear subspace: application to linearly-homomorphic group signatures
- Traceable policy-based signatures and instantiation from lattices
- Privacy Preserving Data Mining within Anonymous Credential Systems
- Efficient code-based fully dynamic group signature scheme
- Towards lightweight anonymous entity authentication for IoT applications
- End-to-end secure messaging with traceability only for illegal content
- On structure-preserving cryptography and lattices
- Step-out group signatures
- More efficient construction of anonymous signatures
- On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation
- Off-line group signatures with smart cards
- Generic Framework for Attribute-Based Group Signature
- Non-interactive zero-knowledge from LPN and MQ
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation
- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434902)