scientific article; zbMATH DE number 2081084

From MaRDI portal
Publication:4474196

zbMath1064.94554MaRDI QIDQ4474196

Hovav Shacham, Ben Lynn, Dan Boneh

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480514.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Unnamed ItemOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesComment fail-stop blind signature scheme design based on pairingsBoneh-Franklin IBELESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationOn the near prime-order MNT curvesEfficient Certificate-Based Signature and Its AggregationLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageOn methods of shortening ElGamal-type signaturesLinkable Message Tagging: Solving the Key Distribution Problem of Signature SchemesPrivacy-enhanced remote data integrity checking with updatable timestampSubgroup Security in Pairing-Based CryptographyExtended Explicit Relations Between Trace, Definition Field, and Embedding DegreeDigital Signatures with Memory-Tight Security in the Multi-challenge SettingCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesAnonymous tokens with public metadata and applications to private contact tracingPlumo: an ultralight blockchain clientSoK: blockchain light clientsAccountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and NonrepudiationEfficient Dynamic Provable Data Possession from Dynamic Binary TreeOn Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured ChannelsA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionA Provably Secure Ring Signature Scheme in Certificateless CryptographyAggregate Proxy Signature and Verifiably Encrypted Proxy SignatureFormal Security Treatments for Signatures from Identity-Based EncryptionAccountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in CloudOn the impossibility of purely algebraic signaturesPolicy-compliant signaturesOrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit lossAn Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse MultiplicationReconstructing Generalized Staircase Polygons with Uniform Step LengthOn hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairingsA provably secure short signature scheme based on discrete logarithmsA t-out-of-n Redactable Signature SchemeA Signature Scheme with Efficient Proof of ValidityHybrid proxy multisignature: a new type multi-party signatureNew \((t, n)\) threshold directed signature scheme with provable securityLeakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesDesigning efficient proxy signature schemes for mobile communicationProvably secure non-interactive key distribution based on pairingsGenerating more MNT elliptic curvesThe Function Field Sieve in the Medium Prime CasePractical Identity-Based Encryption Without Random OraclesProgrammable Hash Functions and Their ApplicationsECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageProvably Secure Identity-Based Undeniable Signatures with Selective and Universal ConvertibilityUniversally Composable Adaptive Oblivious TransferEvaluating Large Degree Isogenies and Applications to Pairing Based CryptographyConstructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic PolynomialsInteger Variable χ–Based Ate PairingOne-Round ID-Based Blind Signature Scheme without ROS AssumptionRevisiting Pairing Based Group Key ExchangeSanitizable and Deletable SignatureConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeFinding Invalid Signatures in Pairing-Based BatchesEfficient KEMs with Partial Message RecoveryVerifier-Key-Flexible Universal Designated-Verifier SignaturesOn the efficient generation of prime-order elliptic curvesOblivious signature-based envelopeA Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerEfficient ID-Based Digital Signatures with Message RecoveryEfficient Privacy Preserving Data Audit in CloudPractical Short Signature Batch VerificationAsymmetric Group Key AgreementSalvaging Merkle-Damgård for Practical ApplicationsID-Based Blind Signature and Proxy Blind Signature without Trusted PKGPublic Cloud Data Auditing with Practical Key Update and Zero Knowledge PrivacyProxy Signature with RevocationIdentity-Based Group EncryptionFinite Field Multiplication Combining AMNS and DFT Approach for Pairing CryptographySecurity of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher ModelStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityMultisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key ModelGenerating Pairing-Friendly Curves with the CM Equation of Degree 1Efficient Pairing Computation on Genus 2 Curves in Projective CoordinatesTowards Security Notions for White-Box CryptographyNew Anonymity Notions for Identity-Based EncryptionOn the Efficient Implementation of Pairing-Based ProtocolsDesignated Confirmer Signatures with Unified VerificationOn Constructing Families of Pairing-Friendly Elliptic Curves with Variable DiscriminantNew Anonymity Notions for Identity-Based EncryptionEscrow-free encryption supporting cryptographic workflowEfficient and Short Certificateless SignatureSkew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based CryptographyAnother Approach to Pairing Computation in Edwards CoordinatesOptimal Online/Offline Signature: How to Sign a Message without Online ComputationSecure Proxy Multi-signature Scheme in the Standard ModelServer-Aided Verification Signatures: Definitions and New ConstructionsHow to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash FunctionsCertificateless signature and proxy signature schemes from bilinear pairingsFail-stop blind signature scheme design based on pairingsSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsDigital SignaturesA strong designated verifier signature scheme tightly related to the LRSW assumptionOn the security of two identity-based signature schemes based on pairings




This page was built for publication: