The following pages link to (Q4318686):
Displaying 50 items.
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound (Q289922) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Identity based identification from algebraic coding theory (Q391761) (← links)
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- New receipt-free voting scheme using double-trapdoor commitment (Q543836) (← links)
- On the unlinkability of randomization-enhanced Chaum's blind signature scheme (Q556113) (← links)
- Secure electronic bills of lading: Blind counts and digital signatures (Q609000) (← links)
- Several practical protocols for authentication and key exchange (Q673818) (← links)
- Zero-knowledge proofs of knowledge for group homomorphisms (Q887447) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Practical proofs of knowledge without relying on theoretical proofs of membership on languages (Q1391315) (← links)
- Improved low-computation partially blind signatures. (Q1412496) (← links)
- Improving the exact security of digital signature schemes (Q1596365) (← links)
- Small generic hardcore subsets for the discrete logarithm: short secret DL-keys. (Q1603445) (← links)
- Fiat-Shamir for highly sound protocols is instantiable (Q1637340) (← links)
- Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs (Q1753171) (← links)
- Proxy blind multi-signature scheme without a secure channel (Q1774851) (← links)
- Delegating a product of group exponentiations with application to signature schemes (Q2025335) (← links)
- Signatures from sequential-OR proofs (Q2055653) (← links)
- Anonymous tokens with private metadata bit (Q2096490) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols (Q2120075) (← links)
- Does Fiat-Shamir require a cryptographic hash function? (Q2139639) (← links)
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures (Q2152049) (← links)
- A correction to a code-based blind signature scheme (Q2163765) (← links)
- Logarithmic-size ring signatures with tight security from the DDH assumption (Q2167754) (← links)
- Cryptographic reverse firewalls for interactive proof systems (Q2220883) (← links)
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- A rational threshold signature model and protocol based on different permissions (Q2336193) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Lower bounds for non-black-box zero knowledge (Q2490264) (← links)
- Converting normal DLP-based signatures into blind (Q2572049) (← links)
- Identification scheme and forward-secure signature in identity-based setting from isogenies (Q2697929) (← links)
- Fiat–Shamir for Highly Sound Protocols Is Instantiable (Q2827720) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources (Q2889864) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- One-Time Signatures and Chameleon Hash Functions (Q3084263) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Security of 2t-Root Identification and Signatures (Q3452348) (← links)
- New Generation of Secure and Practical RSA-Based Signatures (Q3452350) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor (Q3600328) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- Realizing Hash-and-Sign Signatures under Standard Assumptions (Q3627443) (← links)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme (Q3637136) (← links)