Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
From MaRDI portal
Publication:5465818
DOI10.1007/978-3-540-30539-2_20zbMath1094.94527OpenAlexW2117065524MaRDI QIDQ5465818
No author found.
Publication date: 12 August 2005
Published in: Advances in Cryptology - ASIACRYPT 2004 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-30539-2_20
Related Items (6)
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures ⋮ The One-More Discrete Logarithm Assumption in the Generic Group Model ⋮ Improved straight-line extraction in the random oracle model with applications to signature aggregation ⋮ Algebraic (trapdoor) one-way functions: constructions and applications ⋮ Another look at non-standard discrete log and Diffie-Hellman problems ⋮ Two-sided malicious security for private intersection-sum with cardinality
This page was built for publication: Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices