Identity-based trapdoor mercurial commitments and applications
From MaRDI portal
Publication:719291
DOI10.1016/j.tcs.2011.05.031zbMath1236.94072OpenAlexW2060325669MaRDI QIDQ719291
Fangguo Zhang, Jin Li, Haibo Tian, Xiaofeng Chen, Willy Susilo
Publication date: 10 October 2011
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.05.031
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Minimum disclosure proofs of knowledge
- The Weil pairing, and its efficient calculation
- Designated Verifier Proofs and Their Applications
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
- Independent Zero-Knowledge Sets
- Universally Composable Security with Global Setup
- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
- Statistically Hiding Sets
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Financial Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Mercurial Commitments with Applications to Zero-Knowledge Sets
- Progress in Cryptology - INDOCRYPT 2003
- Zero-Knowledge Sets with Short Proofs
- Automata, Languages and Programming
- Security in Communication Networks
- Theory of Cryptography
- Public Key Cryptography – PKC 2004