Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374926

zbMath1082.94539MaRDI QIDQ3374926

Ivan B. Damgård

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (43)

Concurrent knowledge extraction in public-key modelsAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityFiat-Shamir for highly sound protocols is instantiableDual-mode NIZKs: possibility and impossibility results for property transferEverlasting UC commitments from fully malicious PUFsOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelSecure parameterized pattern matchingImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelA verifiable secret shuffle of homomorphic encryptionsLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicySnarkPack: practical SNARK aggregationSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsSIDH proof of knowledgeImproved algebraic MACs and practical keyed-verification anonymous credentialsLattice-based e-cash, revisitedEfficient set operations in the presence of malicious adversariesZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionConcurrent zero knowledge, revisitedGroup EncryptionEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSNew Constructions and Applications of Trapdoor DDH GroupsEquivocal Blind Signatures and Adaptive UC-SecurityOn the relationship between statistical zero-knowledge and statistical randomized encodingsA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesA note on universal composable zero-knowledge in the common reference string modelDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsOn the Portability of Generalized Schnorr ProofsEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionHybrid commitments and their applications to zero-knowledge proof systemsCompact E-Cash and Simulatable VRFs RevisitedConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsFiat–Shamir for Highly Sound Protocols Is InstantiableOn the Relationship Between Statistical Zero-Knowledge and Statistical Randomized EncodingsEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsDesignated Confirmer Signatures with Unified VerificationThreshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryAlways have a backup plan: fully secure synchronous MPC with asynchronous fallback







This page was built for publication: