Pages that link to "Item:Q3787914"
From MaRDI portal
The following pages link to A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (Q3787914):
Displaying 50 items.
- Concurrent knowledge extraction in public-key models (Q271592) (← links)
- On the Clark-Jacob version of SPLICE/AS (Q287082) (← links)
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Blind attribute-based encryption and oblivious transfer with fine-grained access control (Q306333) (← links)
- Tightly secure signatures from lossy identification schemes (Q315555) (← links)
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Unprovable security of perfect NIZK and non-interactive non-malleable commitments (Q332270) (← links)
- Efficient arbitrated quantum signature and its proof of security (Q356871) (← links)
- Identity based identification from algebraic coding theory (Q391761) (← links)
- How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727) (← links)
- Certificateless message recovery signatures providing Girault's level-3 security (Q407496) (← links)
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Which languages have 4-round zero-knowledge proofs? (Q421047) (← links)
- Multi-verifier signatures (Q431790) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Short undeniable signatures based on group homomorphisms (Q451120) (← links)
- Several cryptographic applications of \(\Sigma\)-protocol (Q473026) (← links)
- Sequential aggregate signatures with lazy verification from trapdoor permutations (Q476200) (← links)
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- Practical verifiably encrypted signatures without random oracles (Q506783) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Efficient authenticated data structures for graph connectivity and geometric search problems (Q548654) (← links)
- Chosen ciphertext secure authenticated group communication using identity-based signcryption (Q604107) (← links)
- Long-term security and universal composability (Q604632) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- Secure computation without authentication (Q656923) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- Certificateless undeniable signatures from bilinear maps (Q712691) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- Balancing privacy and accountability in blockchain identity management (Q826291) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring (Q868950) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- A Cartesian product construction for unconditionally secure authentication codes that permit arbitration (Q914647) (← links)
- A simple transitive signature scheme for directed trees (Q924159) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)