Equivocal Blind Signatures and Adaptive UC-Security
From MaRDI portal
Publication:5445514
DOI10.1007/978-3-540-78524-8_19zbMath1162.94374OpenAlexW1869559082MaRDI QIDQ5445514
Aggelos Kiayias, Hong-Sheng Zhou
Publication date: 5 March 2008
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_19
Related Items
Structure-preserving signatures and commitments to group elements ⋮ One-more unforgeability of blind ECDSA ⋮ Security of blind signatures revisited ⋮ A fast and simple partially oblivious PRF, with applications ⋮ Equivocal Blind Signatures and Adaptive UC-Security ⋮ Virtual Smart Cards: How to Sign with a Password and a Server
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- Security arguments for digital signatures and blind signatures
- Strengthening zero-knowledge protocols using signatures
- Concurrent Blind Signatures Without Random Oracles
- Universally composable two-party and multi-party secure computation
- Bounded-concurrent secure two-party computation without setup assumptions
- Perfect Non-interactive Zero Knowledge for NP
- Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
- Universally-Composable Two-Party Computation in Two Rounds
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
- Simulatable Adaptive Oblivious Transfer
- Equivocal Blind Signatures and Adaptive UC-Security
- Security in Communication Networks
- Theory of Cryptography
- Round-Optimal Composable Blind Signatures in the Common Reference String Model
- Theory of Cryptography