Pages that link to "Item:Q5311538"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311538):
Displaying 39 items.
- Certificateless message recovery signatures providing Girault's level-3 security (Q407496) (← links)
- Which languages have 4-round zero-knowledge proofs? (Q421047) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- On the existence of three round zero-knowledge proofs (Q1653072) (← links)
- The hunting of the SNARK (Q1698394) (← links)
- A position-aware Merkle tree for dynamic cloud data integrity verification (Q1701711) (← links)
- On the impossibility of structure-preserving deterministic primitives (Q1715860) (← links)
- On instantiating the algebraic group model from falsifiable assumptions (Q2119007) (← links)
- Succinct non-interactive arguments via linear interactive proofs (Q2136170) (← links)
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures (Q2152049) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- Existence of 3-round zero-knowledge proof systems for NP (Q2425854) (← links)
- Lower bounds for non-black-box zero knowledge (Q2490264) (← links)
- Practical dynamic group signatures without knowledge extractors (Q2692957) (← links)
- On the existence of extractable one-way functions (Q2829449) (← links)
- On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption (Q2945373) (← links)
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796) (← links)
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys (Q3073703) (← links)
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption (Q3092374) (← links)
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security (Q3092375) (← links)
- 3-Message Zero Knowledge Against Human Ignorance (Q3179352) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)
- An Introduction to the Use of zk-SNARKs in Blockchains (Q3294800) (← links)
- An Efficient Privacy-Preserving E-coupon System (Q3454569) (← links)
- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model (Q3593102) (← links)
- Statistically Hiding Sets (Q3623038) (← links)
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols (Q3651591) (← links)
- The Knowledge Complexity of Interactive Proof Systems (Q3833627) (← links)
- Cryptography Using Captcha Puzzles (Q4916003) (← links)
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks (Q4933209) (← links)
- On the Classification of Knowledge-of-exponent Assumptions in Cyclic Groups (Q5135711) (← links)
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation (Q5270364) (← links)
- Efficient and Short Certificateless Signature (Q5502752) (← links)
- Type-Based Proxy Re-encryption and Its Construction (Q5504618) (← links)
- A CCA Secure Hybrid Damgård’s ElGamal Encryption (Q5505459) (← links)
- Access Control Encryption for Equality, Comparison, and More (Q5738753) (← links)
- Fast secure two-party ECDSA signing (Q5918379) (← links)
- Better than advertised security for non-interactive threshold signatures (Q6166964) (← links)
- Beyond Uber: instantiating generic groups via PGGs (Q6169556) (← links)