Topics in Cryptology – CT-RSA 2005
From MaRDI portal
Publication:5710829
DOI10.1007/b105222zbMath1079.94013OpenAlexW2476332689MaRDI QIDQ5710829
Chong Zhang, Haixia Shi, Mihir Bellare
Publication date: 8 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b105222
Related Items (62)
EPID with malicious revocation ⋮ Group Signatures with Decentralized Tracing ⋮ Plaintext-Checkable Encryption ⋮ Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions ⋮ Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy ⋮ A scalable post-quantum hash-based group signature ⋮ Structure-preserving signatures and commitments to group elements ⋮ Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability ⋮ Generic Framework for Attribute-Based Group Signature ⋮ Constant-size structure-preserving signatures: generic constructions and simple assumptions ⋮ Report and trace ring signatures ⋮ Selectively linkable group signatures -- stronger security and preserved verifiability ⋮ Vetted encryption ⋮ Skipping the \(q\) in group signatures ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability ⋮ Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones ⋮ Unlinkable policy-based sanitizable signatures ⋮ Multimodal private signatures ⋮ Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation ⋮ Anonymous yet Traceable Strong Designated Verifier Signature ⋮ Ring signatures with user-controlled linkability ⋮ Attribute based tracing for securing group signatures against centralized authorities ⋮ Structure-preserving signatures on equivalence classes and constant-size anonymous credentials ⋮ Lattice signature with efficient protocols, application to anonymous credentials ⋮ Efficient traceable signatures in the standard model ⋮ Traceable policy-based signatures and instantiation from lattices ⋮ Efficient code-based fully dynamic group signature scheme ⋮ Practical dynamic group signatures without knowledge extractors ⋮ Foundations of fully dynamic group signatures ⋮ Anonymous Proxy Signatures ⋮ Fully Anonymous Group Signatures Without Random Oracles ⋮ Group Encryption ⋮ Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease ⋮ A code-based group signature scheme ⋮ A lattice-based group signature scheme with verifier-local revocation ⋮ A New Dynamic Code-Based Group Signature Scheme ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Compact Group Signatures Without Random Oracles ⋮ Unlinkable Randomizable Signature and Its Application in Group Signature ⋮ Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme ⋮ A lattice-based fully dynamic group signature scheme without NIZK ⋮ On the Theoretical Gap between Group Signatures with and without Unlinkability ⋮ Foundations of Fully Dynamic Group Signatures ⋮ Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures ⋮ Efficient Traceable Signatures in the Standard Model ⋮ Improving revocation for group signature with redactable signature ⋮ Group signatures with user-controlled and sequential linkability ⋮ Group encryption: full dynamicity, message filtering and code-based instantiation ⋮ Lattice-based group signatures: achieving full dynamicity (and deniability) with ease ⋮ Efficient fully structure-preserving signatures and shrinking commitments ⋮ A generic scheme of plaintext-checkable database encryption ⋮ Unnamed Item ⋮ Real Hidden Identity-Based Signatures ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ Survey of Lattice-Based Group Signature ⋮ A Practical Group Signature Scheme Based on Rank Metric
This page was built for publication: Topics in Cryptology – CT-RSA 2005