The following pages link to Georg Fuchsbauer (Q290388):
Displaying 42 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Non-interactive zaps of knowledge (Q1656020) (← links)
- Subversion-zero-knowledge SNARKs (Q1749286) (← links)
- Weakly secure equivalence-class signatures from standard assumptions (Q1753845) (← links)
- The algebraic group model and its applications (Q1784081) (← links)
- Transferable e-cash: a cleaner model and the first practical instantiation (Q2061973) (← links)
- A classification of computational assumptions in the algebraic group model (Q2096519) (← links)
- Double-authentication-preventing signatures in the standard model (Q2106650) (← links)
- Efficient signatures on randomizable ciphertexts (Q2106651) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Adaptively secure proxy re-encryption (Q2289435) (← links)
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials (Q2423846) (← links)
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions (Q2796129) (← links)
- Constrained PRFs for Unbounded Inputs (Q2799033) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Constrained PRFs for Unbounded Inputs with Short Keys (Q2822688) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- Efficient Signatures of Knowledge and DAA in the Standard Model (Q2873656) (← links)
- Plaintext-Checkable Encryption (Q2890016) (← links)
- Constrained Verifiable Random Functions (Q2922655) (← links)
- Adaptive Security of Constrained PRFs (Q2936602) (← links)
- Anonymous Transferable E-Cash (Q2941188) (← links)
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796) (← links)
- Commuting Signatures and Verifiable Encryption (Q3003385) (← links)
- Achieving Optimal Anonymity in Transferable E-Cash with a Judge (Q3011914) (← links)
- Signatures on Randomizable Ciphertexts (Q3084361) (← links)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (Q3392908) (← links)
- Efficient Rational Secret Sharing in Standard Communication Networks (Q3408208) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model (Q3457068) (← links)
- A Quasipolynomial Reduction for Generalized Selective Decryption on Trees (Q3457130) (← links)
- Anonymous Proxy Signatures (Q3540046) (← links)
- Fair Blind Signatures without Random Oracles (Q3558301) (← links)
- Strong Cryptography from Weak Secrets (Q3558319) (← links)
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions (Q3558321) (← links)
- Batch Groth–Sahai (Q3575048) (← links)
- Structure-Preserving Signatures and Commitments to Group Elements (Q3582756) (← links)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures (Q3631371) (← links)
- Key-Homomorphic Constrained Pseudorandom Functions (Q5261669) (← links)
- Enhanced Chosen-Ciphertext Security and Applications (Q5402979) (← links)
- Policy-Based Signatures (Q5402991) (← links)
- Access Control Encryption for Equality, Comparison, and More (Q5738753) (← links)