The following pages link to Theory of Cryptography (Q5898643):
Displaying 20 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Identity-based partially blind signature in the standard model for electronic cash (Q462748) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Security of blind signatures revisited (Q2397446) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption (Q3600513) (← links)
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment (Q3631374) (← links)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer (Q5387104) (← links)
- Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs (Q5418497) (← links)
- Equivocal Blind Signatures and Adaptive UC-Security (Q5445514) (← links)
- Round-Optimal Blind Signatures from Waters Signatures (Q5505463) (← links)
- Efficient Round-Optimal Blind Signatures in the Standard Model (Q5854440) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey (Q6101318) (← links)
- Two faces of blindness (Q6109707) (← links)