Pages that link to "Item:Q3593084"
From MaRDI portal
The following pages link to Security Analysis of the Strong Diffie-Hellman Problem (Q3593084):
Displaying 47 items.
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Group-oriented fair exchange of signatures (Q433010) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Recent progress on the elliptic curve discrete logarithm problem (Q908041) (← links)
- Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group (Q1640704) (← links)
- Secure simultaneous bit extraction from Koblitz curves (Q1755988) (← links)
- Research on attacking a special elliptic curve discrete logarithm problem (Q1793291) (← links)
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption (Q2152147) (← links)
- A fast and simple partially oblivious PRF, with applications (Q2170066) (← links)
- Rerandomizable signatures under standard assumption (Q2179379) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Security-level switchable attribute-based encryption under the strictly weaker assumption family (Q2212065) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- A reduction of security notions in designated confirmer signatures (Q2634663) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions (Q2953792) (← links)
- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes (Q2957111) (← links)
- Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates (Q3297479) (← links)
- Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem (Q3392897) (← links)
- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs (Q3408212) (← links)
- A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials (Q3460098) (← links)
- A new approach to the discrete logarithm problem with auxiliary inputs (Q3467665) (← links)
- Multi-Identity Single-Key Decryption without Random Oracles (Q3600348) (← links)
- Efficient Protocols for Set Membership and Range Proofs (Q3600378) (← links)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption (Q3600513) (← links)
- Another look at non-standard discrete log and Diffie-Hellman problems (Q3612242) (← links)
- Verifiable Random Functions from Identity-Based Key Encapsulation (Q3627457) (← links)
- Computing discrete logarithms in an interval (Q4912022) (← links)
- Vector Commitments and Their Applications (Q4916001) (← links)
- Computing Interval Discrete Logarithm Problem with Restricted Jump Method (Q4988923) (← links)
- Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) (Q5056018) (← links)
- Compact hierarchical identity-based encryption based on a harder decisional problem (Q5259051) (← links)
- Efficient Non-interactive Range Proof (Q5323058) (← links)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer (Q5387104) (← links)
- Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs (Q5418497) (← links)
- Zero-Knowledge Sets with Short Proofs (Q5458606) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)