Pages that link to "Item:Q4414696"
From MaRDI portal
The following pages link to Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme (Q4414696):
Displayed 40 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Efficient oblivious transfers with access control (Q453798) (← links)
- Provably secure randomized blind signature scheme based on bilinear pairing (Q604080) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- An enhanced \((t,n)\) threshold directed signature scheme (Q726561) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- Rogue-key attacks on the multi-designated verifiers signature scheme (Q963405) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- New identity-based society oriented signature schemes from pairings on elliptic curves (Q1765412) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- Non-interactive multisignatures in the plain public-key model with efficient verification (Q1944042) (← links)
- Verifiable threshold quantum secret sharing with sequential communication (Q1994772) (← links)
- Sequential aggregate signatures with short public keys without random oracles (Q2344760) (← links)
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles (Q2377064) (← links)
- Security of blind signatures revisited (Q2397446) (← links)
- Hybrid proxy multisignature: a new type multi-party signature (Q2465334) (← links)
- Protection of mobile location privacy by using blind signature (Q2508228) (← links)
- Forward-secure multisignature and blind signature schemes (Q2572732) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups (Q2794492) (← links)
- Virtual Smart Cards: How to Sign with a Password and a Server (Q2827728) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Subgroup Security in Pairing-Based Cryptography (Q2946453) (← links)
- Security Analysis of the Strong Diffie-Hellman Problem (Q3593084) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption (Q3600513) (← links)
- Another look at non-standard discrete log and Diffie-Hellman problems (Q3612242) (← links)
- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG (Q3628603) (← links)
- Public Verifiability from Pairings in Secret Sharing Schemes (Q3644208) (← links)
- Indifferentiable deterministic hashing to elliptic and hyperelliptic curves (Q4911913) (← links)
- Non-Interactive Key Exchange (Q4916014) (← links)
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies (Q4916023) (← links)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer (Q5387104) (← links)
- Equivocal Blind Signatures and Adaptive UC-Security (Q5445514) (← links)
- Efficient Sequential Aggregate Signed Data (Q5458585) (← links)
- Separation Results on the “One-More” Computational Problems (Q5458933) (← links)
- Round-Optimal Blind Signatures from Waters Signatures (Q5505463) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)