Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307259


DOI10.1007/b97182zbMath1120.94309WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307259

Mihir Bellare, Chanathip Namprempre, Gregory Neven

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Multi-key Hierarchical Identity-Based Signatures, Real Hidden Identity-Based Signatures, The One-More Discrete Logarithm Assumption in the Generic Group Model, A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity, Identity-based signature and extended forking algorithm in the multivariate quadratic setting, Comment on: ``An efficient identity-based signature scheme with provable security, Combined schemes for signature and encryption: the public-key and the identity-based setting, A closer look at multiple forking: leveraging (in)dependence for a tighter bound, Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme, Identity based identification from algebraic coding theory, A round-optimal three-party ID-based authenticated key agreement protocol, A characterization of chameleon hash functions and new, efficient designs, Security analysis of an identity-based strongly unforgeable signature scheme, Multiple point compression on elliptic curves, An improved ring signature scheme without trusted key generation center for wireless sensor network, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, A new framework for the design and analysis of identity-based identification schemes, A secure identity-based proxy multi-signature scheme, A non-interactive deniable authentication scheme based on designated verifier proofs, Security proofs for identity-based identification and signature schemes, Short identity-based signatures with tight security from lattices, DualRing: generic construction of ring signatures with efficient instantiations, Vetted encryption, Tight security for the generic construction of identity-based signature (in the multi-instance setting), Identity-based signatures in standard model, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Certificateless signature: a new security model and an improved generic construction, On the security of a modified Beth identity-based identification scheme, Identity-based ring signatures from RSA, OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, Certificate-Based Signature Schemes without Pairings or Random Oracles, Hash Functions from Sigma Protocols and Improvements to VSH, One-Round ID-Based Blind Signature Scheme without ROS Assumption, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures, Multi-identity management for identity-based cryptography, A Schnorr-Like Lightweight Identity-Based Signature Scheme, On the Theoretical Gap between Group Signatures with and without Unlinkability