Applied Cryptography and Network Security
From MaRDI portal
Publication:4680970
DOI10.1007/B98360zbMATH Open1103.68515OpenAlexW4301861138MaRDI QIDQ4680970FDOQ4680970
Authors: Jens Groth
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (12)
- Zero-knowledge proofs for committed symmetric Boolean functions
- Astrolabous: a universally composable time-lock encryption scheme
- Memory lower bounds of reductions revisited
- On some incompatible properties of voting schemes
- Ceremonies for End-to-End Verifiable Elections
- Policy-based signature scheme from lattices
- A lattice-based group signature scheme with message-dependent opening
- Short paper: ballot secrecy for liquid democracy
- Secure Stern Signatures in Quantum Random Oracle Model
- Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
- Deciding knowledge in security protocols under some e-voting theories
- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680970)