Skipping the \(q\) in group signatures
From MaRDI portal
Publication:2152050
DOI10.1007/978-3-030-65277-7_25zbMath1492.94183OpenAlexW3111966184MaRDI QIDQ2152050
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_25
Related Items (2)
Skipping the \(q\) in group signatures ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Pairings for cryptographers
- Constant-size group signatures from lattices
- Skipping the \(q\) in group signatures
- Group signatures with selective linkability
- Group signatures without NIZK: from lattices in the standard model
- Lattice-based group signatures: achieving full dynamicity (and deniability) with ease
- Foundations of Fully Dynamic Group Signatures
- Dynamic Fully Anonymous Short Group Signatures
- Traceable Signature with Stepping Capabilities
- Tightly Secure Signatures and Public-Key Encryption
- Tightly-Secure Signatures from Chameleon Hash Functions
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Quasi-Efficient Revocation of Group Signatures
- Achieving Optimal Anonymity in Transferable E-Cash with a Judge
- A Group Signature Scheme from Lattice Assumptions
- Signatures on Randomizable Ciphertexts
- Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security
- Compact E-Cash and Simulatable VRFs Revisited
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
- Fair Blind Signatures without Random Oracles
- Batch Groth–Sahai
- Compact Group Signatures Without Random Oracles
- The Uber-Assumption Family
- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
- Group Signatures
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fully Anonymous Group Signatures Without Random Oracles
- Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
- Pairing-Friendly Elliptic Curves of Prime Order
- Divisible E-Cash Systems Can Be Truly Anonymous
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Separation Results on the “One-More” Computational Problems
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Topics in Cryptology – CT-RSA 2005
- A Closer Look at PKI: Security and Efficiency
- Round-Optimal Composable Blind Signatures in the Common Reference String Model
- Adaptive oblivious transfer with access control from lattice assumptions
This page was built for publication: Skipping the \(q\) in group signatures