The following pages link to (Q2778843):
Displaying 50 items.
- Policy-based signature scheme from lattices (Q306050) (← links)
- Garbling XOR gates ``for free'' in the standard model (Q315547) (← links)
- Efficient oblivious transfers with access control (Q453798) (← links)
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity (Q621579) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Improved algebraic MACs and practical keyed-verification anonymous credentials (Q1698653) (← links)
- On the impossibility of structure-preserving deterministic primitives (Q1715860) (← links)
- Private authentication (Q1881255) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Round-optimal blind signatures in the plain model from classical and quantum standard assumptions (Q2056693) (← links)
- Large scale, actively secure computation from LPN and free-XOR garbled circuits (Q2056780) (← links)
- Group signatures with user-controlled and sequential linkability (Q2061926) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Anonymous tokens with private metadata bit (Q2096490) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- TurboIKOS: improved non-interactive zero knowledge and post-quantum signatures (Q2117059) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Issuer-hiding attribute-based credentials (Q2149822) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials (Q2423846) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Policy-compliant signatures (Q2697898) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Recovering Lost Device-Bound Credentials (Q2794506) (← links)
- Formal Treatment of Privacy-Enhancing Credential Systems (Q2807189) (← links)
- Towards Lightweight Anonymous Entity Authentication for IoT Applications (Q2817466) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials (Q2829958) (← links)
- Signatures and Efficient Proofs on Committed Graphs and NP-Statements (Q2948189) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions (Q2953783) (← links)
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones (Q2953786) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Breaking and Fixing Anonymous Credentials for the Cloud (Q3297625) (← links)
- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability (Q3452236) (← links)