Topics in Cryptology – CT-RSA 2005

From MaRDI portal
Publication:5710829

DOI10.1007/b105222zbMath1079.94013OpenAlexW2476332689MaRDI QIDQ5710829

Chong Zhang, Haixia Shi, Mihir Bellare

Publication date: 8 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b105222




Related Items (62)

EPID with malicious revocationGroup Signatures with Decentralized TracingPlaintext-Checkable EncryptionCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyA scalable post-quantum hash-based group signatureStructure-preserving signatures and commitments to group elementsAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityGeneric Framework for Attribute-Based Group SignatureConstant-size structure-preserving signatures: generic constructions and simple assumptionsReport and trace ring signaturesSelectively linkable group signatures -- stronger security and preserved verifiabilityVetted encryptionSkipping the \(q\) in group signaturesGroup signatures and more from isogenies and lattices: generic, simple, and efficientEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicySignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesUnlinkable policy-based sanitizable signaturesMultimodal private signaturesAchieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationAnonymous yet Traceable Strong Designated Verifier SignatureRing signatures with user-controlled linkabilityAttribute based tracing for securing group signatures against centralized authoritiesStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsLattice signature with efficient protocols, application to anonymous credentialsEfficient traceable signatures in the standard modelTraceable policy-based signatures and instantiation from latticesEfficient code-based fully dynamic group signature schemePractical dynamic group signatures without knowledge extractorsFoundations of fully dynamic group signaturesAnonymous Proxy SignaturesFully Anonymous Group Signatures Without Random OraclesGroup EncryptionLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseA code-based group signature schemeA lattice-based group signature scheme with verifier-local revocationA New Dynamic Code-Based Group Signature SchemeA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Group signatures and more from isogenies and lattices: generic, simple, and efficientCompact Group Signatures Without Random OraclesUnlinkable Randomizable Signature and Its Application in Group SignatureAnonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesPrivacy-preserving authenticated key exchange and the case of IKEv2Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeA lattice-based fully dynamic group signature scheme without NIZKOn the Theoretical Gap between Group Signatures with and without UnlinkabilityFoundations of Fully Dynamic Group SignaturesProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard ModelImproving revocation for group signature with redactable signatureGroup signatures with user-controlled and sequential linkabilityGroup encryption: full dynamicity, message filtering and code-based instantiationLattice-based group signatures: achieving full dynamicity (and deniability) with easeEfficient fully structure-preserving signatures and shrinking commitmentsA generic scheme of plaintext-checkable database encryptionUnnamed ItemReal Hidden Identity-Based SignaturesAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersSurvey of Lattice-Based Group SignatureA Practical Group Signature Scheme Based on Rank Metric




This page was built for publication: Topics in Cryptology – CT-RSA 2005