Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307247


DOI10.1007/b97182zbMath1122.94385WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307247

Leonid Reyzin, Silvio Micali, Hovav Shacham, Anna Lysyanskaya

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature, The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance, Proxy Signatures Secure Against Proxy Key Exposure, Efficient Sequential Aggregate Signed Data, Must the communication graph of MPC protocols be an expander?, Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party, Batch arguments for \textsf{NP} and more from standard bilinear group assumptions, Locally verifiable signature and key aggregation, Half-aggregation of Schnorr signatures with tight reductions, Pointcheval-Sanders signature-based synchronized aggregate signature, Identity-based interactive aggregate signatures from lattices, Secure proxy signature schemes for delegation of signing rights, Sequential aggregate signatures with lazy verification from trapdoor permutations, Ambiguous optimistic fair exchange: definition and constructions, Notes on the security of certificateless aggregate signature schemes, Optimal security proofs for full domain hash. Revisited, How to protect privacy in optimistic fair exchange of digital signatures, Non-interactive multisignatures in the plain public-key model with efficient verification, Robust subgroup multi-signatures for consensus, A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement, FSSE: forward secure searchable encryption with keyed-block chains, Simple Schnorr multi-signatures with applications to bitcoin, Sequential aggregate signatures with short public keys without random oracles, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes, Incrementally aggregatable vector commitments and applications to verifiable decentralized storage, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, Sanitizable and Deletable Signature