Traceable receipt-free encryption
From MaRDI portal
Publication:6135436
DOI10.1007/978-3-031-22969-5_10zbMath1519.94104OpenAlexW4317928255MaRDI QIDQ6135436
No author found.
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_10
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure distributed key generation for discrete-log based cryptosystems
- Efficient signatures on randomizable ciphertexts
- Efficient Fully Structure-Preserving Signatures for Large Messages
- Receipt-free secret-ballot elections (extended abstract)
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Malleable Proof Systems and Applications
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- End-to-End Verifiable Elections in the Standard Model
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Signatures on Randomizable Ciphertexts
- Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting
- Simplified Submission of Inputs to Protocols
- On Some Incompatible Properties of Voting Schemes
- Structure-Preserving Signatures and Commitments to Group Elements
- Universally Composable Incoercibility
- Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations
- A Commitment-Consistent Proof of a Shuffle
- How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
- Achieving independence efficiently and securely
- Fuzzy Identity-Based Encryption
- Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Advances in Cryptology - CRYPTO 2003
- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
- Theory of Cryptography
- Theory of Cryptography
- Traceable receipt-free encryption
This page was built for publication: Traceable receipt-free encryption