Theory of Cryptography
From MaRDI portal
Publication:5898642
DOI10.1007/11681878zbMATH Open1112.94005OpenAlexW3149533473MaRDI QIDQ5898642FDOQ5898642
Authors: A. Bender, Ruggero Morselli, Jonathan Katz
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Recommendations
- Ring signatures: Stronger definitions, and constructions without random oracles
- Ring signatures of constant size without random oracles
- Ring Signatures of Sub-linear Size Without Random Oracles
- Stronger notions and a more efficient construction of threshold ring signatures
- Efficient Ring Signatures Without Random Oracles
- A simpler construction of identity-based ring signatures from lattices
- Efficient and random oracle-free conditionally anonymous ring signature
- Unique Ring Signatures: A Practical Construction
Cited In (89)
- Anonymous authenticated communication
- Anonymous counting tokens
- Compact accountable ring signatures in the plain model
- Improving the efficiency of report and trace ring signatures
- Practical Range Proof for Cryptocurrency Monero with Provable Security
- Secure efficient history-hiding append-only signatures in the standard model
- \textsf{ZKAttest}: ring and group signatures for existing ECDSA keys
- The Fiat-Shamir transform for group and ring signature schemes
- A note on non-interactive zero-knowledge from CDH
- Constant size ring signature without random oracle
- Count me in! Extendability for threshold ring signatures
- On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes
- Property-Based Attestation without a Trusted Third Party
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- More efficient construction of anonymous signatures
- Ring signatures for deniable AKEM: Gandalf's fellowship
- Non-interactive zero-knowledge from LPN and MQ
- Collusion-resistant convertible ring signature schemes
- Step-Out Ring Signatures
- An efficient conditionally anonymous ring signature in the random oracle model
- Computational and symbolic anonymity in an unbounded network
- Ring signatures: logarithmic-size, no setup -- from standard assumptions
- Unlinkable and invisible \(\gamma \)-sanitizable signatures
- SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions
- Certificateless threshold ring signature
- Logarithmic-size ring signatures with tight security from the DDH assumption
- Forward-secure linkable ring signatures
- Public Key Cryptography – PKC 2004
- Toward non-interactive zero-knowledge proofs for NP from LWE
- A new constant-size accountable ring signature scheme without random oracles
- It wasn't me! Repudiability and claimability of ring signatures
- DualDory: logarithmic-verifier linkable ring signatures through preprocessing
- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
- Identity-based quotable ring signature
- Certificate-free \textit{ad hoc} anonymous authentication
- An enhanced \((t,n)\) threshold directed signature scheme
- On the Security Models of (Threshold) Ring Signature Schemes
- On the definition of anonymity for ring signatures
- A note on the post-quantum security of (ring) signatures
- Title not available (Why is that?)
- Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
- Universal ring signatures in the standard model
- Triply adaptive UC NIZK
- Sub-linear size traceable ring signatures without random oracles
- Efficient traceable ring signature scheme without pairings
- Mesh Signatures
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
- One-time traceable ring signatures
- Report and trace ring signatures
- Threshold ring signatures: new definitions and post-quantum security
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2006
- A new ring signature scheme with signer-admission property
- Unconditionally anonymous ring and mesh signatures
- Tightly secure ring signatures in the standard model
- DualRing: generic construction of ring signatures with efficient instantiations
- Progress in Cryptology - INDOCRYPT 2003
- Ring Signatures of Sub-linear Size Without Random Oracles
- ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE
- Policy controlled system with anonymity
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
- Short accountable ring signatures based on DDH
- Ambiguous optimistic fair exchange: definition and constructions
- Optimistic fair exchange in the enhanced chosen-key model
- A note on an identity-based ring signature scheme with signer verifiability
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- Non-interactive zero knowledge from sub-exponential DDH
- How to Leak a Secret and Reap the Rewards Too
- A generic framework for accountable optimistic fair exchange protocol
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- Compact ring signatures from learning with errors
- On tightly-secure (linkable) ring signatures
- Ring signatures: Stronger definitions, and constructions without random oracles
- Identity based linkable ring signature with logarithmic size
- Ring signature scheme based on multivariate public key cryptosystems
- Efficient and random oracle-free conditionally anonymous ring signature
- Ambiguous Optimistic Fair Exchange
- Ring signatures of constant size without random oracles
- Applied Cryptography and Network Security
- Compact Ring Signature in the Standard Model for Blockchain
- Stronger notions and a more efficient construction of threshold ring signatures
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Efficient ring signatures in the standard model
- Identity-based ring signatures from RSA
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- Leakage-resilient ring signature schemes
- Unconditionally Anonymous Controllable ID-Based Ring Signatures
- An efficient ring signature scheme from pairings
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898642)