Pages that link to "Item:Q1573771"
From MaRDI portal
The following pages link to Security arguments for digital signatures and blind signatures (Q1573771):
Displaying 50 items.
- Combined schemes for signature and encryption: the public-key and the identity-based setting (Q259033) (← links)
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound (Q289922) (← links)
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Tightly secure signatures from lossy identification schemes (Q315555) (← links)
- Identity based signature scheme based on cubic residues (Q350965) (← links)
- A provable secure fuzzy identity based signature scheme (Q362302) (← links)
- Extending concurrent signature to multiple parties (Q401477) (← links)
- Certificateless message recovery signatures providing Girault's level-3 security (Q407496) (← links)
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Group-oriented fair exchange of signatures (Q433010) (← links)
- Group-oriented setting's multisigncryption scheme with threshold designcryption (Q433057) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- Efficient certificateless proxy signature scheme with provable security (Q454968) (← links)
- A note on asynchronous multi-exponentiation algorithm using binary representation (Q456161) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- Identity-based deniable authentication for ad hoc networks (Q488856) (← links)
- Cryptanalysis and improvement of a certificateless aggregate signature scheme (Q527158) (← links)
- An ID-based multi-signer universal designated multi-verifier signature scheme (Q549664) (← links)
- On the unlinkability of randomization-enhanced Chaum's blind signature scheme (Q556113) (← links)
- Chosen ciphertext secure authenticated group communication using identity-based signcryption (Q604107) (← links)
- A note on an identity-based ring signature scheme with signer verifiability (Q627180) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- An efficient identity based generalized signcryption scheme (Q653334) (← links)
- Provably secure and efficient proxy signature with untrustworthy proxy signer (Q655114) (← links)
- Provably convertible multi-authenticated encryption scheme for generalized group communications (Q712686) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Provably secure and efficient identification and key agreement protocol with user anonymity (Q716313) (← links)
- Certificate-free \textit{ad hoc} anonymous authentication (Q726164) (← links)
- Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption (Q726469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Digital signature scheme set in a hidden cyclic group (Q821308) (← links)
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures (Q826296) (← links)
- FROST: Flexible round-optimized Schnorr threshold signatures (Q832324) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- Distributed ring signatures from general dual access structures (Q851736) (← links)
- Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring (Q868950) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Security of self-certified signatures (Q990946) (← links)
- Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces (Q1003091) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Improving the exact security of digital signature schemes (Q1596365) (← links)
- Identity-based undetachable digital signature for mobile agents in electronic commerce (Q1626229) (← links)
- Fiat-Shamir for highly sound protocols is instantiable (Q1637340) (← links)
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery (Q1637871) (← links)
- Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system (Q1639394) (← links)