scientific article; zbMATH DE number 1406779

From MaRDI portal
Publication:4940695

zbMath0939.94546MaRDI QIDQ4940695

Berry Schoenmakers, Ronald Cramer, Ivan B. Damgård

Publication date: 1 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

DualRing: generic construction of ring signatures with efficient instantiationsConfidential and efficient asset proof for bitcoin exchangesConcurrent knowledge extraction in public-key modelsMore efficient shuffle argument from unique factorizationEfficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessAutomata evaluation and text search protocols with simulation-based securityCompressing proofs of \(k\)-out-of-\(n\) partial knowledge\textsf{Mac'n'Cheese}: zero-knowledge proofs for Boolean and arithmetic circuits with nested disjunctionsAttribute-based versions of Schnorr and ElGamalUnconditionally anonymous ring and mesh signaturesBlindOR: an efficient lattice-based blind signature scheme from OR-proofsImproved zero-knowledge argument of encrypted extended permutationRate-limited secure function evaluationOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionLogarithmic-size ring signatures with tight security from the DDH assumptionElectronic jury voting protocolsFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesA verifiable secret shuffle of homomorphic encryptionsCompact and Efficient UC Commitments Under Atomic-ExchangesOn server trust in private proxy auctionsSecure two-party computation via cut-and-choose oblivious transferSignatures and Efficient Proofs on Committed Graphs and NP-StatementsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeIndistinguishable Proofs of Work or KnowledgeA short non-delegatable strong designated verifier signatureTwo-server password-only authenticated key exchangeMultikey Fully Homomorphic Encryption and ApplicationsCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationNon-interactive composition of sigma-protocols via Share-then-HashEfficient set operations in the presence of malicious adversariesAcyclicity programming for sigma-protocolsLeakproof secret sharing protocols with applications to group identification schemeAttribute-based signatures from RSAA Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksTight security for the generic construction of identity-based signature (in the multi-instance setting)Concurrent zero knowledge, revisitedCryptographic reverse firewalls for interactive proof systemsPrivacy-Preserving Similarity Evaluation and Application to Remote Biometrics AuthenticationResource fairness and composability of cryptographic protocolsSeveral cryptographic applications of \(\Sigma\)-protocolConcurrent signature without random oraclesAn Introduction to the Use of zk-SNARKs in BlockchainsA framework for non-interactive instance-dependent commitment schemes (NIC)All-but-many encryptionEfficient one-sided adaptively secure computationRate-Limited Secure Function Evaluation: Definitions and ConstructionsAn efficient conditionally anonymous ring signature in the random oracle modelNovel \(\Omega\)-protocols for NPNew receipt-free voting scheme using double-trapdoor commitmentWhat security can we achieve within 4 rounds?List signature schemesDelayed-input cryptographic protocolsA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s ReputationUnclonable Group IdentificationA Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff VotingFormalising \(\varSigma\)-protocols and commitment schemes using cryptholTraceable ring signatures: general framework and post-quantum securityA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesImproved OR-Composition of Sigma-ProtocolsCertificateless threshold ring signatureCollusion-resistant convertible ring signature schemesA General, Flexible and Efficient Proof of Inclusion and ExclusionA note on universal composable zero-knowledge in the common reference string modelThe ring authenticated encryption scheme-how to provide a clue wiselyDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsSignatures from sequential-OR proofsStacked garbling for disjunctive zero-knowledge proofsStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsThreshold ring signatures: new definitions and post-quantum securityA Commitment-Consistent Proof of a ShuffleThreshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsCo-sound Zero-Knowledge with Public KeysVerifiable Multi-party Computation with Perfectly Private Audit TrailHybrid commitments and their applications to zero-knowledge proof systemsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsMore efficient digital signatures with tight multi-user securityA generic framework for accountable optimistic fair exchange protocolRing signatures: Stronger definitions, and constructions without random oraclesFilling the gap between voters and cryptography in e-votingA Secure and Efficient Proof of Integer in an Interval RangeOn the Necessary and Sufficient Assumptions for UC ComputationEfficient and tight oblivious transfer from PKE with tight multi-user securityCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmicsAn efficient protocol for secure two-party computation in the presence of malicious adversariesThe measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and moreShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesDesignated-verifier linkable ring signaturesUnlinkable and invisible \(\gamma \)-sanitizable signaturesBit-Slice Auction CircuitShort identity-based signatures with tight security from lattices




This page was built for publication: