Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307278


DOI10.1007/b97182zbMath1122.94414WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307278

Victor Shoup, Yevgeniy Dodis, Antonio R. Nicolosi, Aggelos Kiayias

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182


94A62: Authentication, digital signatures and secret sharing


Related Items

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Unconditionally Anonymous Controllable ID-Based Ring Signatures, Unconditionally anonymous ring and mesh signatures, An efficient ring signature scheme from pairings, Certificateless threshold ring signature, Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05, Ring signatures: Stronger definitions, and constructions without random oracles, Leakage-resilient ring signature schemes, Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme, DualRing: generic construction of ring signatures with efficient instantiations, Compact ring signatures from learning with errors, Stronger notions and a more efficient construction of threshold ring signatures, One-time traceable ring signatures, Identity based linkable ring signature with logarithmic size, Logarithmic-size ring signatures with tight security from the DDH assumption, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, Efficient traceable ring signature scheme without pairings, Foundations of fully dynamic group signatures, Strongly unforgeable ring signature scheme from lattices in the standard model, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, Ring signature scheme based on multivariate public key cryptosystems, Identity-based ring signatures from RSA, List signature schemes, On tightly-secure (linkable) ring signatures, Non-interactive composition of sigma-protocols via Share-then-Hash, Non-malleable vector commitments via local equivocability, Foundations of Fully Dynamic Group Signatures, How to Leak a Secret and Reap the Rewards Too, Sub-linear Size Traceable Ring Signatures without Random Oracles, Constant Size Ring Signature Without Random Oracle, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Property-Based Attestation without a Trusted Third Party, Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems, Generalized Identity Based and Broadcast Encryption Schemes