Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
From MaRDI portal
Publication:5458935
Recommendations
- Optimistic fair exchange in a multi-user setting
- Optimistic Fair Exchange in a Multi-user Setting
- Further observations on optimistic fair exchange protocols in the multi-user setting
- Optimistic fair exchange in the enhanced chosen-key model
- Certificate-based fair exchange protocol of Schnorr signatures in chosen-key model
Cited in
(19)- Optimistic fair exchange in a multi-user setting
- A Generic Framework for Accountable Optimistic Fair Exchange Protocol
- Extending concurrent signature to multiple parties
- Group-oriented fair exchange of signatures
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Practical verifiably encrypted signatures without random oracles
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
- Concurrent signatures with fully negotiable binding control
- The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles
- Ambiguous Optimistic Fair Exchange
- Optimistic Fair Exchange in a Multi-user Setting
- A generic framework for accountable optimistic fair exchange protocol
- Further observations on optimistic fair exchange protocols in the multi-user setting
- Certificate-based fair exchange protocol of Schnorr signatures in chosen-key model
- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
- Attribute-based optimistic fair exchange: how to restrict brokers with policies
- How to protect privacy in optimistic fair exchange of digital signatures
- Ambiguous optimistic fair exchange: definition and constructions
- Optimistic fair exchange in the enhanced chosen-key model
This page was built for publication: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458935)