scientific article; zbMATH DE number 2081084
From MaRDI portal
Publication:4474196
zbMATH Open1064.94554MaRDI QIDQ4474196FDOQ4474196
Authors: Dan Boneh, Ben Lynn, Hovav Shacham
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480514.htm
Title of this publication is not available (Why is that?)
Recommendations
Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Cited In (only showing first 100 items - show all)
- Efficient Tate pairing computation using double-base chains
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic five
- Generic construction for tightly-secure signatures from discrete log
- EPID with malicious revocation
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
- Efficient discrete logarithm based multi-signature scheme in the plain public key model
- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
- Identity-based matchmaking encryption from standard assumptions
- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
- Secure Proxy Multi-signature Scheme in the Standard Model
- Pairing-based cryptography on elliptic curves
- On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6
- Computing discrete logarithms in \(\mathbb F_{p^6}\)
- Optimal security proofs for full domain hash. Revisited
- Escrow-free encryption supporting cryptographic workflow
- Subgroup security in pairing-based cryptography
- Oblivious signature-based envelope
- Secure simultaneous bit extraction from Koblitz curves
- A comparison of MNT curves and supersingular curves
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- A provably secure short signature scheme based on discrete logarithms
- FAS: forward secure sequential aggregate signatures for secure logging
- On computable isomorphisms in efficient asymmetric pairing-based systems
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
- On constructing families of pairing-friendly elliptic curves with variable discriminant
- Public audit for operation behavior logs with error locating in cloud storage
- A signature scheme with efficient proof of validity
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- The random oracle model: a twenty-year retrospective
- Strongly anonymous ratcheted key exchange
- Hardware implementation of multiplication over quartic extension fields
- Towards Security Notions for White-Box Cryptography
- Implementing optimized pairings with elliptic nets
- A short non-delegatable strong designated verifier signature
- Cloud data auditing with designated verifier
- A scheme for verification on data integrity in mobile multicloud computing environment
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Identity-based chameleon hashing and signatures without key exposure
- A generic framework for accountable optimistic fair exchange protocol
- A provably secure proxy signcryption scheme using bilinear pairings
- The Function Field Sieve in the Medium Prime Case
- Non-interactive multisignatures in the plain public-key model with efficient verification
- Aggregatable distributed key generation
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- On the efficient implementation of pairing-based protocols
- Uniform encodings to elliptic curves and indistinguishable point representation
- Fail-stop blind signature scheme design based on pairings
- Generating Pairing-Friendly Curves with the CM Equation of Degree 1
- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials
- Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- Efficient KEMs with Partial Message Recovery
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation
- Comment fail-stop blind signature scheme design based on pairings
- Injective encodings to binary ordinary elliptic curves
- Some efficient distributed digital signatures
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
- Using abelian varieties to improve pairing-based cryptography
- On the security of two identity-based signature schemes based on pairings
- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG
- Salvaging Merkle-Damgård for Practical Applications
- Certificateless message recovery signatures providing Girault's level-3 security
- Identity-based threshold decryption on access structure
- Efficient ID-Based Digital Signatures with Message Recovery
- A pairing-based publicly verifiable secret sharing scheme
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- Efficient selective identity-based encryption without random oracles
- A method for constructing a self-dual normal basis in odd characteristic extension fields
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Enhanced short signature scheme with hybrid problems
- Practical Short Signature Batch Verification
- Breaking the short certificateless signature scheme
- Designing efficient proxy signature schemes for mobile communication
- How to construct secure proxy cryptosystem
- Elliptic curve cryptography: the serpentine course of a paradigm shift
- On bilinear structures on divisor class groups
- Generic security-amplifying methods of ordinary digital signatures
- Structure-preserving signatures and commitments to group elements
- Programmable hash functions and their applications
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Identity-based trapdoor mercurial commitments and applications
- An enhanced \((t,n)\) threshold directed signature scheme
- Hybrid proxy multisignature: a new type multi-party signature
- Secure proxy signature schemes for delegation of signing rights
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Server-Aided Verification Signatures: Definitions and New Constructions
- Short signatures from the Weil pairing
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves
- Efficient certificateless proxy signature scheme with provable security
- Another Approach to Pairing Computation in Edwards Coordinates
- Efficient and Short Certificateless Signature
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474196)