Theory of Cryptography

From MaRDI portal
Publication:5898642

DOI10.1007/11681878zbMath1112.94005OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898642

Ruggero Morselli, Adam Bender, Jonathan N. Katz

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878



Related Items

Compact ring signatures from learning with errors, One-time traceable ring signatures, Report and trace ring signatures, Identity based linkable ring signature with logarithmic size, Unconditionally Anonymous Controllable ID-Based Ring Signatures, Constant Size Ring Signature Without Random Oracle, Logarithmic-size ring signatures with tight security from the DDH assumption, Toward non-interactive zero-knowledge proofs for NP from LWE, Efficient traceable ring signature scheme without pairings, Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood), How to Leak a Secret and Reap the Rewards Too, On tightly-secure (linkable) ring signatures, More efficient construction of anonymous signatures, DualDory: logarithmic-verifier linkable ring signatures through preprocessing, Count me in! Extendability for threshold ring signatures, A note on the post-quantum security of (ring) signatures, Triply adaptive UC NIZK, Anonymous authenticated communication, Improving the efficiency of report and trace ring signatures, Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework), Compact Ring Signature in the Standard Model for Blockchain, Universal ring signatures in the standard model, Ring signature scheme based on multivariate public key cryptosystems, A note on non-interactive zero-knowledge from CDH, On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes, Leakage-resilient ring signature schemes, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Property-Based Attestation without a Trusted Third Party, Optimistic fair exchange in the enhanced chosen-key model, Ambiguous optimistic fair exchange: definition and constructions, Practical Range Proof for Cryptocurrency Monero with Provable Security, Tightly secure ring signatures in the standard model, Identity-based ring signatures from RSA, Identity-based quotable ring signature, An efficient ring signature scheme from pairings, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, Ambiguous Optimistic Fair Exchange, Policy controlled system with anonymity, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Certificate-free \textit{ad hoc} anonymous authentication, An enhanced \((t,n)\) threshold directed signature scheme, Certificateless threshold ring signature, Sub-linear Size Traceable Ring Signatures without Random Oracles, Threshold ring signatures: new definitions and post-quantum security, Non-interactive zero knowledge from sub-exponential DDH, A generic framework for accountable optimistic fair exchange protocol, Ring signatures: Stronger definitions, and constructions without random oracles, NIZK from LPN and trapdoor hash via correlation intractability for approximable relations, A strong designated verifier signature scheme tightly related to the LRSW assumption, Unlinkable and invisible \(\gamma \)-sanitizable signatures