scientific article; zbMATH DE number 2081086
From MaRDI portal
zbMath1064.94558MaRDI QIDQ4474199
Adi Shamir, Yael Tauman, Ronald L. Rivest
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480552.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
signature schemegroup signature schemedesignated verifier signature schemering signature schemesigner-ambiguous signature scheme
Related Items
DualRing: generic construction of ring signatures with efficient instantiations, Compact ring signatures from learning with errors, Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version, Revocable and Linkable Ring Signature, Short Attribute-Based Signatures for Threshold Predicates, SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions, Private authentication, A secure anonymous proxy signcryption scheme, Compressing proofs of \(k\)-out-of-\(n\) partial knowledge, Policy-based signature scheme from lattices, Group-Based Source-Destination Verifiable Encryption with Blacklist Checking, Multi-designated verifiers signatures: anonymity without encryption, SoK: securing email -- a stakeholder-based analysis, Stronger notions and a more efficient construction of threshold ring signatures, Unconditionally anonymous ring and mesh signatures, One-time traceable ring signatures, Report and trace ring signatures, Identity based linkable ring signature with logarithmic size, Certificateless ring signature based on RSA problem and DL problem, Unconditionally Anonymous Controllable ID-Based Ring Signatures, A new ring signature scheme with signer-admission property, Logarithmic-size ring signatures with tight security from the DDH assumption, Group signatures and more from isogenies and lattices: generic, simple, and efficient, Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctions, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, Efficient traceable ring signature scheme without pairings, Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood), How to Leak a Secret and Reap the Rewards Too, On tightly-secure (linkable) ring signatures, More efficient construction of anonymous signatures, An improved ring signature scheme without trusted key generation center for wireless sensor network, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, Explainable arguments, Efficient lattice-based traceable ring signature scheme with its application in blockchain, Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions, Efficient democratic group signatures with threshold traceability, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Cryptanalysis of multivariate threshold ring signature schemes, A note on an identity-based ring signature scheme with signer verifiability, Ring signature scheme based on multivariate public key cryptosystems, Identity-based chameleon hashing and signatures without key exposure, Non-interactive composition of sigma-protocols via Share-then-Hash, Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices, Acyclicity programming for sigma-protocols, Leakage-resilient ring signature schemes, Two extensions of the ring signature scheme of Rivest-Shamir-Taumann, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Two new identity-based threshold ring signature schemes, Analysis and improvement of authenticatable ring signcryption scheme, Anonymous Proxy Signatures, Property-Based Attestation without a Trusted Third Party, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Tightly secure ring signatures in the standard model, Self-organized Anonymous Authentication in Mobile Ad Hoc Networks, Identity-based ring signatures from RSA, Electronic voting scheme based on a quantum ring signature, Identity-based quotable ring signature, A certificateless ring signature scheme with high efficiency in the random oracle model, Decentralized Attribute-Based Signatures, An efficient conditionally anonymous ring signature in the random oracle model, An efficient ring signature scheme from pairings, An ID-based multi-signer universal designated multi-verifier signature scheme, List signature schemes, Hidden attribute-based signatures without anonymity revocation, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Group signatures and more from isogenies and lattices: generic, simple, and efficient, Generalized Identity Based and Broadcast Encryption Schemes, Policy controlled system with anonymity, Escrow free attribute-based signature with self-revealability, Certificate-free \textit{ad hoc} anonymous authentication, Traceable ring signatures: general framework and post-quantum security, Certificateless threshold ring signature, Collusion-resistant convertible ring signature schemes, Attribute-Based Signatures, Sub-linear Size Traceable Ring Signatures without Random Oracles, The ring authenticated encryption scheme-how to provide a clue wisely, Certificate-Based Generalized Ring Signcryption Scheme, Compact designated verifier NIZKs from the CDH assumption without pairings, Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures, Signatures from sequential-OR proofs, Threshold ring signatures: new definitions and post-quantum security, Privacy-preserving authenticated key exchange and the case of IKEv2, Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme, LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks, RingRainbow – An Efficient Multivariate Ring Signature Scheme, Legally Fair Contract Signing Without Keystones, Forward-Secure Group Signatures from Pairings, Two-party adaptor signatures from identification schemes, A generic framework for accountable optimistic fair exchange protocol, Efficient fully structure-preserving signatures and shrinking commitments, New approaches for deniable authentication, Digital Signatures, Strongly unforgeable ring signature scheme from lattices in the standard model, Covert authentication from lattices, Efficient and tight oblivious transfer from PKE with tight multi-user security, Post-quantum ID-based ring signatures from symmetric-key primitives, Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages, Designated-verifier linkable ring signatures, A novel quantum ring signature scheme without using entangled states, Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party, Extendable threshold ring signatures with enhanced anonymity, Non-interactive blind signatures for random messages, Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication, Multimodal private signatures, Designated-verifier linkable ring signatures with unconditional anonymity, Continuous authentication in secure messaging, Ring signatures with user-controlled linkability, DualDory: logarithmic-verifier linkable ring signatures through preprocessing, Efficient unique ring signatures from lattices, NIZK from SNARGs, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, Count me in! Extendability for threshold ring signatures, A note on the post-quantum security of (ring) signatures, Logarithmic-size (linkable) threshold ring signatures in the plain model, DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF, Anonymous authenticated communication, YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model, Short-lived zero-knowledge proofs and signatures, Improving the efficiency of report and trace ring signatures, Redeeming reset indifferentiability and applications to post-quantum security, Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework), A new lattice-based online/offline signatures framework for low-power devices, Hierarchical Attribute-Based Signatures, Compact Ring Signature in the Standard Model for Blockchain, Threshold signatures with private accountability, Post-quantum asynchronous deniable key exchange and the signal handshake, Universal ring signatures in the standard model, Fully anonymous identity-based broadcast signcryption with public verification, Traceable policy-based signatures and instantiation from lattices