Pages that link to "Item:Q3582756"
From MaRDI portal
The following pages link to Structure-Preserving Signatures and Commitments to Group Elements (Q3582756):
Displaying 50 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Policy-based signature scheme from lattices (Q306050) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- Linearly-homomorphic signatures and scalable mix-nets (Q2055710) (← links)
- Transferable e-cash: a cleaner model and the first practical instantiation (Q2061973) (← links)
- Partially structure-preserving signatures: lower bounds, constructions and more (Q2117038) (← links)
- Selectively linkable group signatures -- stronger security and preserved verifiability (Q2149824) (← links)
- Subversion-resilient enhanced privacy ID (Q2152180) (← links)
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds (Q2167723) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Short tightly secure signatures for signing a vector of group elements: a new approach (Q2330115) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- Security of blind signatures revisited (Q2397446) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials (Q2423846) (← links)
- Efficient chameleon hash functions in the enhanced collision resistant model (Q2658065) (← links)
- Privacy-enhanced remote data integrity checking with updatable timestamp (Q2663494) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Fully-succinct publicly verifiable delegation from constant-size assumptions (Q2695648) (← links)
- Dory: efficient, transparent arguments for generalised inner products and polynomial commitments (Q2697847) (← links)
- A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model (Q2697926) (← links)
- Non-Interactive Zero-Knowledge Proofs of Non-Membership (Q2790035) (← links)
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions (Q2790054) (← links)
- Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography (Q2796128) (← links)
- Towards Lightweight Anonymous Entity Authentication for IoT Applications (Q2817466) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- Plaintext-Checkable Encryption (Q2890016) (← links)
- Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability (Q2946483) (← links)
- Generalizing Efficient Multiparty Computation (Q2947520) (← links)
- Signatures and Efficient Proofs on Committed Graphs and NP-Statements (Q2948189) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions (Q2953783) (← links)
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones (Q2953786) (← links)
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796) (← links)
- The Kernel Matrix Diffie-Hellman Assumption (Q2958145) (← links)
- A Signature Scheme with Efficient Proof of Validity (Q3005577) (← links)
- Achieving Optimal Anonymity in Transferable E-Cash with a Judge (Q3011914) (← links)
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model (Q3011915) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency (Q3194598) (← links)
- Breaking and Fixing Anonymous Credentials for the Cloud (Q3297625) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model (Q3457068) (← links)