Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311538

DOI10.1007/b99099zbMath1104.94043OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311538

Adriana Palacio, Mihir Bellare

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (40)

Succinct non-interactive arguments via linear interactive proofsAn Efficient Privacy-Preserving E-coupon System3-Message Zero Knowledge Against Human IgnoranceThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionAsymmetric group message franking: definitions and constructionsCertificateless message recovery signatures providing Girault's level-3 securityExistence of 3-round zero-knowledge proof systems for NPPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashWhich languages have 4-round zero-knowledge proofs?Better than advertised security for non-interactive threshold signaturesBeyond Uber: instantiating generic groups via PGGsThe hunting of the SNARKA position-aware Merkle tree for dynamic cloud data integrity verificationPractical dynamic group signatures without knowledge extractorsOn the impossibility of structure-preserving deterministic primitivesOn the Classification of Knowledge-of-exponent Assumptions in Cyclic GroupsAn Introduction to the Use of zk-SNARKs in BlockchainsCryptography Using Captcha PuzzlesThe Knowledge Complexity of Interactive Proof SystemsAccess Control Encryption for Equality, Comparison, and MoreLower bounds for non-black-box zero knowledgeIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksThe Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard ModelFast secure two-party ECDSA signingDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysStatistically Hiding SetsObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityOn the Existence of Extractable One-Way FunctionsEfficient fully structure-preserving signatures and shrinking commitmentsComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsEfficient and Short Certificateless SignatureType-Based Proxy Re-encryption and Its ConstructionA CCA Secure Hybrid Damgård’s ElGamal EncryptionLattice-Based SNARGs and Their Application to More Efficient ObfuscationOn instantiating the algebraic group model from falsifiable assumptions






This page was built for publication: Advances in Cryptology – CRYPTO 2004