Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374927

zbMath1082.94534MaRDI QIDQ3374927

Fabrice Boudot

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (43)

Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingA reduction of security notions in designated confirmer signaturesNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsEfficient Non-interactive Range ProofElectronic jury voting protocolsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelOn server trust in private proxy auctionsSignatures and Efficient Proofs on Committed Graphs and NP-StatementsHow to deal with malicious users in privacy‐preserving distributed data miningZero-knowledge arguments for subverted RSA groupsComplex Zero-Knowledge Proofs of Knowledge Are Easy to UseEfficient RSA key generation and threshold Paillier in the two-party settingUniversally composable \(\varSigma \)-protocols in the global random-oracle modelZero-knowledge range arguments for signed fractional numbers from latticesMultilevel threshold secret sharing based on the Chinese remainder theoremPrivacy-Preserving Similarity Evaluation and Application to Remote Biometrics AuthenticationBlind Identity-Based Encryption and Simulatable Oblivious TransferSeveral cryptographic applications of \(\Sigma\)-protocolPractical Range Proof for Cryptocurrency Monero with Provable SecuritySecure Authenticated ComparisonsRemoving the Strong RSA Assumption from Arguments over the IntegersA Framework for Constructing Convertible Undeniable SignaturesEfficient Binary Conversion for Paillier Encrypted ValuesSecure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesEfficient Protocols for Set Membership and Range ProofsCryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05Fast secure two-party ECDSA signingZero-Knowledge Authenticated Order Queries and Order Statistics on a ListA General, Flexible and Efficient Proof of Inclusion and ExclusionOn the Portability of Generalized Schnorr ProofsEfficient range proofs with transparent setup from bounded integer commitmentsNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesCompact E-Cash and Simulatable VRFs RevisitedTowards Restricting Plaintext Space in Public Key EncryptionA Secure and Efficient Proof of Integer in an Interval RangeEncryption Switching ProtocolsEfficient, Robust and Constant-Round Distributed RSA Key GenerationEfficiency Limitations for Σ-Protocols for Group HomomorphismsSanitizable Signatures RevisitedA Verifiable Secret Sharing Scheme Based on the Chinese Remainder TheoremTwo-sided malicious security for private intersection-sum with cardinalityAugmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsPrivacy-preserving data aggregation with probabilistic range validation




This page was built for publication: