Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
From MaRDI portal
Publication:5087265
Recommendations
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Weakly secure equivalence-class signatures from standard assumptions
- Formal treatment of privacy-enhancing credential systems
- Delegatable anonymous credentials from mercurial signatures
Cites work
- scientific article; zbMATH DE number 1952906 (Why is no real title available?)
- (Hierarchical) identity-based encryption from affine message authentication
- Access Control Encryption for Equality, Comparison, and More
- Adaptive partitioning
- Advances in Cryptology – CRYPTO 2004
- An algebraic framework for Diffie-Hellman assumptions
- Batching techniques for accumulators with applications to IOPs and stateless blockchains
- Composable and modular anonymous credentials: definitions and practical constructions
- Constant-Size Commitments to Polynomials and Their Applications
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Delegatable anonymous credentials from mercurial signatures
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
- Efficient concurrent zero-knowledge in the auxiliary string model
- Efficient invisible and unlinkable sanitizable signatures
- Efficient redactable signature and application to anonymous credentials
- Efficient verifiable delay functions
- Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
- Issuer-hiding attribute-based credentials
- Kurosawa-Desmedt meets tight security
- Malleable proof systems and applications
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system
- More efficient (almost) tightly secure structure-preserving signatures
- On Signatures of Knowledge
- Optimal verification of operations on dynamic sets
- Practical Round-Optimal Blind Signatures in the Standard Model
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
- Randomizable Proofs and Delegatable Anonymous Credentials
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
- Signatures with flexible public key: introducing equivalence classes for public keys
- Stretching Groth-Sahai: NIZK proofs of partial satisfiability
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Structure-preserving signatures from standard assumptions, revisited
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Structure-preserving signatures on equivalence classes from standard assumptions
- The kernel matrix Diffie-Hellman assumption
- Topics in Cryptology – CT-RSA 2005
- Weakly secure equivalence-class signatures from standard assumptions
- Zero-Knowledge Accumulators and Set Algebra
Cited in
(12)- Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
- Selective delegation of attributes in mercurial signature credentials
- Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Breaking and fixing anonymous credentials for the cloud
- Attribute-based anonymous credential: optimization for single-use and multi-use
- On proving equivalence class signatures secure from non-interactive assumptions
- Formal treatment of privacy-enhancing credential systems
- A new approach to efficient revocable attribute-based anonymous credentials
- Auditable attribute-based credentials scheme and its application in contact tracing
This page was built for publication: Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5087265)