Theory of Cryptography
From MaRDI portal
Publication:5898645
DOI10.1007/11681878zbMath1112.94006WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898645
Yevgeniy Dodis, Dario Catalano, Ivan Visconti
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
94A60: Cryptography
Related Items
Vector Commitments and Their Applications, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Zero-Knowledge Sets with Short Proofs, Non-malleable vector commitments via local equivocability, Identity-based trapdoor mercurial commitments and applications, Hybrid commitments and their applications to zero-knowledge proof systems, Anonymous protocols: notions and equivalence, Mercurial commitments with applications to zero-knowledge sets, Non-malleable vector commitments via local equivocability, A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles, Improved OR-Composition of Sigma-Protocols, Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, Statistically Hiding Sets