scientific article; zbMATH DE number 2081084
From MaRDI portal
Publication:4474196
Recommendations
Cited in
(only showing first 100 items - show all)- Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
- Efficient Tate pairing computation using double-base chains
- Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic five
- Generic construction for tightly-secure signatures from discrete log
- EPID with malicious revocation
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
- On indifferentiable deterministic hashing into elliptic curves
- Efficient discrete logarithm based multi-signature scheme in the plain public key model
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- An alternative approach to public cloud data auditing supporting data dynamics
- Expected linear round synchronization: the missing link for linear Byzantine SMR
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Using abelian varieties to improve pairing-based cryptography
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
- On the security of two identity-based signature schemes based on pairings
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
- A note on digital signature scheme using a self-pairing map
- Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
- Identity-based matchmaking encryption from standard assumptions
- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG
- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
- Certificateless message recovery signatures providing Girault's level-3 security
- Identity-based threshold decryption on access structure
- Salvaging Merkle-Damgård for Practical Applications
- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography
- Sequential aggregate signatures with short public keys: design, analysis and implementation studies
- Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
- A short and stateless signature
- Still wrong use of pairings in cryptography
- Secure Proxy Multi-signature Scheme in the Standard Model
- A pairing-based publicly verifiable secret sharing scheme
- Extended explicit relations between trace, definition field, and embedding degree
- Pairing-based cryptography on elliptic curves
- Efficient ID-Based Digital Signatures with Message Recovery
- Efficient selective identity-based encryption without random oracles
- On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- A method for constructing a self-dual normal basis in odd characteristic extension fields
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
- Lightweight asynchronous verifiable secret sharing with optimal resilience
- Identity-based proxy re-encryption based on SM9
- Fair delivery of decentralised randomness beacon
- McFly: verifiable encryption to the future made practical
- TVES: threshold verifiably encrypted signature and its applications
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Enhanced short signature scheme with hybrid problems
- Breaking the short certificateless signature scheme
- Computing discrete logarithms in \(\mathbb F_{p^6}\)
- Optimal security proofs for full domain hash. Revisited
- On hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairings
- Practical Short Signature Batch Verification
- Good-case early-stopping latency of synchronous Byzantine reliable broadcast: the deterministic case
- Designing efficient proxy signature schemes for mobile communication
- How to construct secure proxy cryptosystem
- Elliptic curve cryptography: the serpentine course of a paradigm shift
- Efficient dynamic provable data possession from dynamic binary tree
- On bilinear structures on divisor class groups
- Generic security-amplifying methods of ordinary digital signatures
- Sequential aggregate signatures with short public keys without random oracles
- An intelligent approach for building a secure decentralized public key infrastructure in VANET
- Escrow-free encryption supporting cryptographic workflow
- Subgroup security in pairing-based cryptography
- A t-out-of-n Redactable Signature Scheme
- Revisiting Pairing Based Group Key Exchange
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Cryptanalysis of the privacy-preserving ride-hailing service TRACE
- Leakage-resilient revocable identity-based signature with cloud revocation authority
- Structure-preserving signatures and commitments to group elements
- Programmable hash functions and their applications
- Secure simultaneous bit extraction from Koblitz curves
- Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
- Plumo: an ultralight blockchain client
- SoK: blockchain light clients
- Short signatures from the difficulty of factoring problem
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- A comparison of MNT curves and supersingular curves
- Identity-based trapdoor mercurial commitments and applications
- Oblivious signature-based envelope
- An enhanced \((t,n)\) threshold directed signature scheme
- Secure proxy signature schemes for delegation of signing rights
- Sanitizable and Deletable Signature
- Threshold signatures with private accountability
- Hybrid proxy multisignature: a new type multi-party signature
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Proxy signature with revocation
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Boneh-Franklin IBE
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting
- On the near prime-order MNT curves
- Optimal Online/Offline Signature: How to Sign a Message without Online Computation
- A provably secure short signature scheme based on discrete logarithms
- FAS: forward secure sequential aggregate signatures for secure logging
- \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- On computable isomorphisms in efficient asymmetric pairing-based systems
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- How to sample a discrete Gaussian (and more) from a random oracle
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474196)