Theory of Cryptography

From MaRDI portal
Publication:5898643

DOI10.1007/11681878zbMath1112.94018OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898643

Tatsuaki Okamoto

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878




Related Items (26)

Structure-preserving signatures and commitments to group elementsSecurity of blind signatures revisitedShort signatures from Diffie-Hellman: realizing almost compact public keyBoosting the Security of Blind Signature SchemesPAPR: publicly auditable privacy revocation for anonymous credentialsRai-Choo! Evolving blind signatures to the next levelElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreTwo faces of blindnessOn pairing-free blind signature schemes in the algebraic group modelThe Abe-Okamoto partially blind signature scheme revisitedMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemProgrammable hash functions and their applicationsIdentity-based partially blind signature in the standard model for electronic cashBlind Identity-Based Encryption and Simulatable Oblivious TransferAnalysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputsOne-Round ID-Based Blind Signature Scheme without ROS AssumptionEquivocal Blind Signatures and Adaptive UC-SecurityAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsDiscrete logarithm problems with auxiliary inputsTight security for signature schemes without random oraclesUnconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to CommitmentPractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsRound-Optimal Blind Signatures from Waters SignaturesEfficient Round-Optimal Blind Signatures in the Standard ModelLattice-based blind signatures, revisited




This page was built for publication: Theory of Cryptography