Theory of Cryptography
From MaRDI portal
Publication:5898642
Recommendations
- Ring signatures: Stronger definitions, and constructions without random oracles
- Ring signatures of constant size without random oracles
- Ring Signatures of Sub-linear Size Without Random Oracles
- Stronger notions and a more efficient construction of threshold ring signatures
- Efficient Ring Signatures Without Random Oracles
- A simpler construction of identity-based ring signatures from lattices
- Efficient and random oracle-free conditionally anonymous ring signature
- Unique Ring Signatures: A Practical Construction
Cited in
(89)- An efficient conditionally anonymous ring signature in the random oracle model
- Anonymous authenticated communication
- Computational and symbolic anonymity in an unbounded network
- Anonymous counting tokens
- Ring signatures: logarithmic-size, no setup -- from standard assumptions
- Certificateless threshold ring signature
- Unlinkable and invisible \(\gamma \)-sanitizable signatures
- Compact accountable ring signatures in the plain model
- SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions
- Logarithmic-size ring signatures with tight security from the DDH assumption
- Forward-secure linkable ring signatures
- Toward non-interactive zero-knowledge proofs for NP from LWE
- A new constant-size accountable ring signature scheme without random oracles
- Public Key Cryptography – PKC 2004
- It wasn't me! Repudiability and claimability of ring signatures
- Improving the efficiency of report and trace ring signatures
- Practical Range Proof for Cryptocurrency Monero with Provable Security
- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
- Identity-based quotable ring signature
- DualDory: logarithmic-verifier linkable ring signatures through preprocessing
- Certificate-free \textit{ad hoc} anonymous authentication
- An enhanced \((t,n)\) threshold directed signature scheme
- On the definition of anonymity for ring signatures
- On the Security Models of (Threshold) Ring Signature Schemes
- A note on the post-quantum security of (ring) signatures
- scientific article; zbMATH DE number 2081086 (Why is no real title available?)
- Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
- Universal ring signatures in the standard model
- Sub-linear size traceable ring signatures without random oracles
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
- Efficient traceable ring signature scheme without pairings
- Triply adaptive UC NIZK
- Mesh Signatures
- Secure efficient history-hiding append-only signatures in the standard model
- One-time traceable ring signatures
- Report and trace ring signatures
- Threshold ring signatures: new definitions and post-quantum security
- The Fiat-Shamir transform for group and ring signature schemes
- \textsf{ZKAttest}: ring and group signatures for existing ECDSA keys
- scientific article; zbMATH DE number 1942438 (Why is no real title available?)
- Unconditionally anonymous ring and mesh signatures
- A new ring signature scheme with signer-admission property
- Topics in Cryptology – CT-RSA 2006
- Tightly secure ring signatures in the standard model
- DualRing: generic construction of ring signatures with efficient instantiations
- Constant size ring signature without random oracle
- A note on non-interactive zero-knowledge from CDH
- Count me in! Extendability for threshold ring signatures
- ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE
- Progress in Cryptology - INDOCRYPT 2003
- Ring Signatures of Sub-linear Size Without Random Oracles
- Policy controlled system with anonymity
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
- On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes
- Property-Based Attestation without a Trusted Third Party
- Ambiguous optimistic fair exchange: definition and constructions
- Optimistic fair exchange in the enhanced chosen-key model
- A note on an identity-based ring signature scheme with signer verifiability
- Short accountable ring signatures based on DDH
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- Non-interactive zero knowledge from sub-exponential DDH
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- How to Leak a Secret and Reap the Rewards Too
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- A generic framework for accountable optimistic fair exchange protocol
- Compact ring signatures from learning with errors
- Ring signatures: Stronger definitions, and constructions without random oracles
- On tightly-secure (linkable) ring signatures
- Identity based linkable ring signature with logarithmic size
- More efficient construction of anonymous signatures
- Ring signature scheme based on multivariate public key cryptosystems
- Ring signatures for deniable AKEM: Gandalf's fellowship
- Efficient and random oracle-free conditionally anonymous ring signature
- Ambiguous Optimistic Fair Exchange
- Ring signatures of constant size without random oracles
- Collusion-resistant convertible ring signature schemes
- Non-interactive zero-knowledge from LPN and MQ
- Applied Cryptography and Network Security
- Compact Ring Signature in the Standard Model for Blockchain
- Stronger notions and a more efficient construction of threshold ring signatures
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Efficient ring signatures in the standard model
- Identity-based ring signatures from RSA
- Step-Out Ring Signatures
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- Leakage-resilient ring signature schemes
- Unconditionally Anonymous Controllable ID-Based Ring Signatures
- An efficient ring signature scheme from pairings
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898642)