Pages that link to "Item:Q5311552"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311552):
Displaying 50 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Zero-knowledge proofs of retrievability (Q350924) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Group-oriented fair exchange of signatures (Q433010) (← links)
- Efficient oblivious transfers with access control (Q453798) (← links)
- Several cryptographic applications of \(\Sigma\)-protocol (Q473026) (← links)
- Ambiguous optimistic fair exchange: definition and constructions (Q476859) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Fixed argument pairing inversion on elliptic curves (Q499662) (← links)
- A code-based group signature scheme (Q510499) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts (Q548093) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem (Q683912) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Cryptography in the multi-string model (Q744350) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- A generic scheme of plaintext-checkable database encryption (Q781853) (← links)
- A scalable post-quantum hash-based group signature (Q831185) (← links)
- A comparison of MNT curves and supersingular curves (Q862563) (← links)
- On computable isomorphisms in efficient asymmetric pairing-based systems (Q869575) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Solutions to the anti-piracy problem in oblivious transfer (Q899580) (← links)
- Efficient Tate pairing computation using double-base chains (Q954437) (← links)
- Comparing two pairing-based aggregate signature schemes (Q970534) (← links)
- Pairings for cryptographers (Q1003698) (← links)
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions (Q1006046) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- A lattice-based group signature scheme with verifier-local revocation (Q1749538) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- How to protect privacy in optimistic fair exchange of digital signatures (Q1750341) (← links)
- Secure simultaneous bit extraction from Koblitz curves (Q1755988) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- Statistical ZAPR arguments from bilinear maps (Q2055670) (← links)