Pages that link to "Item:Q4414696"
From MaRDI portal
The following pages link to Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme (Q4414696):
Displaying 50 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Efficient oblivious transfers with access control (Q453798) (← links)
- Provably secure randomized blind signature scheme based on bilinear pairing (Q604080) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- An enhanced \((t,n)\) threshold directed signature scheme (Q726561) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- Rogue-key attacks on the multi-designated verifiers signature scheme (Q963405) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- New identity-based society oriented signature schemes from pairings on elliptic curves (Q1765412) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- Non-interactive multisignatures in the plain public-key model with efficient verification (Q1944042) (← links)
- Verifiable threshold quantum secret sharing with sequential communication (Q1994772) (← links)
- Threshold ring signatures: new definitions and post-quantum security (Q2055701) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- Round-optimal blind signatures in the plain model from classical and quantum standard assumptions (Q2056693) (← links)
- An efficient blind signature scheme based on SM2 signature algorithm (Q2057164) (← links)
- Two-party adaptor signatures from identification schemes (Q2061930) (← links)
- BETA: biometric-enabled threshold authentication (Q2061958) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Anonymous tokens with private metadata bit (Q2096490) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- Two-round trip Schnorr multi-signatures via delinearized witnesses (Q2120071) (← links)
- MuSig2: simple two-round Schnorr multi-signatures (Q2120074) (← links)
- Fast isomorphic state channels (Q2147250) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- Robust subgroup multi-signatures for consensus (Q2152179) (← links)
- A fast and simple partially oblivious PRF, with applications (Q2170066) (← links)
- Short pairing-free blind signatures with exponential security (Q2170071) (← links)
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- Sequential aggregate signatures with short public keys without random oracles (Q2344760) (← links)
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles (Q2377064) (← links)
- Security of blind signatures revisited (Q2397446) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- Hybrid proxy multisignature: a new type multi-party signature (Q2465334) (← links)
- Protection of mobile location privacy by using blind signature (Q2508228) (← links)
- Forward-secure multisignature and blind signature schemes (Q2572732) (← links)
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security (Q2677568) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss (Q2697915) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups (Q2794492) (← links)
- Virtual Smart Cards: How to Sign with a Password and a Server (Q2827728) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- A strong designated verifier signature scheme tightly related to the LRSW assumption (Q2868163) (← links)
- Subgroup Security in Pairing-Based Cryptography (Q2946453) (← links)
- Security Analysis of the Strong Diffie-Hellman Problem (Q3593084) (← links)
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles (Q3593112) (← links)