P-signatures and Noninteractive Anonymous Credentials

From MaRDI portal
Publication:5445515

DOI10.1007/978-3-540-78524-8_20zbMath1162.94338OpenAlexW1931152882MaRDI QIDQ5445515

Markulf Kohlweiss, Melissa Chase, Anna Lysyanskaya, Mira Belenkiy

Publication date: 5 March 2008

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_20




Related Items

Structure-preserving signatures and commitments to group elementsShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsSomewhere statistically binding commitment schemes with applicationsEfficient and secure attribute-based signature for monotone predicatesGeneralizing Efficient Multiparty ComputationPrivacy-preserving blueprintsSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesPAPR: publicly auditable privacy revocation for anonymous credentialsRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsCredential transparency systemNIWI and new notions of extraction for algebraic languagesSNACKs: leveraging proofs of sequential work for blockchain light clientsSmooth zero-knowledge hash functionsZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsEfficient traceable signatures in the standard modelOn the impossibility of structure-preserving deterministic primitivesDecentralized Attribute-Based SignaturesUniversally Composable Adaptive Oblivious TransferEscrow free attribute-based signature with self-revealabilityNon-interactive Confirmer SignaturesFormal Treatment of Privacy-Enhancing Credential SystemsDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsNon-interactive anonymous routerCompact E-Cash and Simulatable VRFs RevisitedProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard ModelUniversally Composable Adaptive Priced Oblivious TransferEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages