Theory of Cryptography
From MaRDI portal
Publication:5898645
DOI10.1007/11681878zbMath1112.94006OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898645
Yevgeniy Dodis, Dario Catalano, Ivan Visconti
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Related Items (14)
Mercurial commitments with applications to zero-knowledge sets ⋮ Non-malleable vector commitments via local equivocability ⋮ Vector Commitments and Their Applications ⋮ Identity-based trapdoor mercurial commitments and applications ⋮ Concise Mercurial Subvector Commitments: Definitions and Constructions ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Non-malleable vector commitments via local equivocability ⋮ A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles ⋮ Improved OR-Composition of Sigma-Protocols ⋮ Zero-Knowledge Sets with Short Proofs ⋮ Statistically Hiding Sets ⋮ Hybrid commitments and their applications to zero-knowledge proof systems ⋮ Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs ⋮ Anonymous protocols: notions and equivalence
This page was built for publication: Theory of Cryptography