scientific article; zbMATH DE number 2081084
From MaRDI portal
Publication:4474196
Recommendations
Cited in
(only showing first 100 items - show all)- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves
- Short signatures from the Weil pairing
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
- Efficient certificateless proxy signature scheme with provable security
- Server-Aided Verification Signatures: Definitions and New Constructions
- An improvement of optimal ate pairing on KSS curve with pseudo 12-sparse multiplication
- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography
- New Anonymity Notions for Identity-Based Encryption
- Compact Multi-Party Confidential Transactions
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions
- On constructing families of pairing-friendly elliptic curves with variable discriminant
- A new universal designated verifier transitive signature scheme for big graph data
- Another Approach to Pairing Computation in Edwards Coordinates
- Efficient and Short Certificateless Signature
- Provably secure non-interactive key distribution based on pairings
- Improved straight-line extraction in the random oracle model with applications to signature aggregation
- Public audit for operation behavior logs with error locating in cloud storage
- Practical post-quantum few-time verifiable random function with applications to Algorand
- New identity-based society oriented signature schemes from pairings on elliptic curves
- Efficient identity-based authenticated key agreement protocol from pairings
- High-speed high-security signatures
- Asymmetric Group Key Agreement
- Programmable Hash Functions and Their Applications
- A survey of elliptic curves for proof systems
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Snowblind: a threshold blind signature in pairing-free groups
- The random oracle model: a twenty-year retrospective
- A signature scheme with efficient proof of validity
- Anonymous tokens with public metadata and applications to private contact tracing
- Hardware implementation of multiplication over quartic extension fields
- A taxonomy of pairing-friendly elliptic curves
- Strongly anonymous ratcheted key exchange
- Towards Security Notions for White-Box Cryptography
- On the efficient generation of prime-order elliptic curves
- Linkable message tagging: solving the key distribution problem of signature schemes
- A content extraction signature scheme based on short signature
- Individual discrete logarithm with sublattice reduction
- Efficient proxy signcryption scheme with provable CCA and CMA security
- Short-lived zero-knowledge proofs and signatures
- Implementing optimized pairings with elliptic nets
- A short non-delegatable strong designated verifier signature
- Cloud data auditing with designated verifier
- Privacy-enhanced remote data integrity checking with updatable timestamp
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
- A scheme for verification on data integrity in mobile multicloud computing environment
- Secure and efficient delegation of elliptic-curve pairing
- Efficient generic on-line/off-line (threshold) signatures without key exposure
- Searchable encryption with randomized ciphertext and randomized keyword search
- Efficient algorithms for secure outsourcing of bilinear pairings
- On proving equivalence class signatures secure from non-interactive assumptions
- Registered attribute-based signature
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions
- Designated confirmer signatures with unified verification
- Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases
- On the security of ECDSA with additive key derivation and presignatures
- Optimal tightness for chain-based unique signatures
- Practical non-interactive publicly verifiable secret sharing with thousands of parties
- Short pairing-free blind signatures with exponential security
- Identity-based chameleon hashing and signatures without key exposure
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- Reconstructing generalized staircase polygons with uniform step length
- A generic framework for accountable optimistic fair exchange protocol
- Digital signatures
- A provably secure proxy signcryption scheme using bilinear pairings
- Generating more MNT elliptic curves
- Asymmetric group message franking: definitions and constructions
- Rai-Choo! Evolving blind signatures to the next level
- Threshold and multi-signature schemes from linear hash functions
- Boneh-Boyen encryption and signature scheme on the Jacobian of a hyperelliptic curve
- PI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and more
- Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
- Private set operations from multi-query reverse private membership test
- Lattice-based threshold, accountable, and private signature
- Concurrently secure blind Schnorr signatures
- Twinkle: threshold signatures from DDH with full adaptive security
- Threshold raccoon: practical threshold signatures from standard lattice assumptions
- Fast batched asynchronous distributed key generation
- Monotone-policy aggregate signatures
- Signatures with memory-tight security in the quantum random oracle model
- Updatable public-key encryption, revisited
- Provably secure server-aided verification signatures
- The Function Field Sieve in the Medium Prime Case
- Non-interactive multisignatures in the plain public-key model with efficient verification
- Better than advertised security for non-interactive threshold signatures
- Identity-based encryption with security against the KGC: a formal model and its instantiations
- Two-party adaptor signatures from identification schemes
- Updatable signatures and message authentication codes
- Identity-based key distribution for mobile ad hoc networks
- On methods of shortening ElGamal-type signatures
- Aggregatable distributed key generation
- Identity-based group encryption
- Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded
- Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management
- SecDedup: secure data deduplication with dynamic auditing in the cloud
- Pairing-free blind signatures from CDH assumptions
- Verifier-Key-Flexible Universal Designated-Verifier Signatures
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474196)