The following pages link to Theory of Cryptography (Q5898643):
Displaying 38 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Identity-based partially blind signature in the standard model for electronic cash (Q462748) (← links)
- Provably secure randomized blind signature scheme based on bilinear pairing (Q604080) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- An efficient blind signature scheme based on SM2 signature algorithm (Q2057164) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Security of blind signatures revisited (Q2397446) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Tight security for signature schemes without random oracles (Q2516531) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (Q2827730) (← links)
- Sub-linear Blind Ring Signatures without Random Oracles (Q2870101) (← links)
- Secure identity-based blind signature scheme in the standard model (Q2888076) (← links)
- Compact Round-Optimal Partially-Blind Signatures (Q2912788) (← links)
- Concurrent Blind Signatures Without Random Oracles (Q3541878) (← links)
- Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions (Q3596389) (← links)
- Efficient Partially Blind Signatures with Provable Security (Q3600108) (← links)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption (Q3600513) (← links)
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment (Q3631374) (← links)
- A Framework for Universally Composable Non-committing Blind Signatures (Q3650707) (← links)
- (Q4536807) (← links)
- (Q4739525) (← links)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer (Q5387104) (← links)
- Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs (Q5418497) (← links)
- Efficient Round Optimal Blind Signatures (Q5418712) (← links)
- Equivocal Blind Signatures and Adaptive UC-Security (Q5445514) (← links)
- Security in Communication Networks (Q5491695) (← links)
- Round-Optimal Blind Signatures from Waters Signatures (Q5505463) (← links)
- Efficient Round-Optimal Blind Signatures in the Standard Model (Q5854440) (← links)
- Discrete logarithm problems with auxiliary inputs (Q5962223) (← links)
- Boosting the Security of Blind Signature Schemes (Q6041294) (← links)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey (Q6101318) (← links)
- PI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and more (Q6108972) (← links)
- Two faces of blindness (Q6109707) (← links)
- On pairing-free blind signature schemes in the algebraic group model (Q6113966) (← links)
- The Abe-Okamoto partially blind signature scheme revisited (Q6175978) (← links)
- Concurrently secure blind Schnorr signatures (Q6636502) (← links)