Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4035712

zbMath0763.94015MaRDI QIDQ4035712

Torben P. Pedersen

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesSecure Computation, I/O-Efficient Algorithms and Distributed SignaturesBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentImprovement of identity-based threshold proxy signature scheme with known signersA threshold scheme under peer-to-peer networkInformation-theoretic secure verifiable secret sharing over RSA modulusMultiparty Proximity Testing with Dishonest Majority from Equality TestingA property-based attestation protocol for TCMUC Updatable Databases and ApplicationsPractical and Provably-Secure Commitment Schemes from Collision-Free HashingConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionStoring and Retrieving Secrets on a BlockchainMaking Private Function Evaluation Safer, Faster, and SimplerRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionCompact and Efficient UC Commitments Under Atomic-ExchangesBeating the Birthday Paradox in Dining Cryptographer NetworksSignatures and Efficient Proofs on Committed Graphs and NP-StatementsHow to deal with malicious users in privacy‐preserving distributed data miningCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesPrivacy-preserving blueprintsPrivate polynomial commitments and applications to MPCDynamic and Verifiable Hierarchical Secret SharingAn Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsThreshold and multi-signature schemes from linear hash functionsRevisiting BBS signaturesTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing schemePractical Threshold Signatures Without Random OraclesAn accurate, scalable and verifiable protocol for federated differentially private averagingIdentity-based encryption in DDH hard groupsMultimodal private signaturesFunction-Dependent Commitments for Verifiable Multi-party ComputationNearly optimal property preserving hashingTwo faces of blindnessA bivariate polynomial-based cryptographic hard problem and its applicationsAn efficient publicly verifiable and proactive secret sharing schemeKDM security for the Fujisaki-Okamoto transformations in the QROMCount me in! Extendability for threshold ring signaturesThe Kernel Matrix Diffie-Hellman AssumptionRevisiting group oriented secret sharing schemesTrustworthy sealed-bid auction with low communication cost atop blockchainBlack-box anonymous commit-and-proveAnonymous tokens with stronger metadata bit hiding from algebraic MACsAstrolabous: a universally composable time-lock encryption schemeProofs for inner pairing products and applicationsFully-Simulatable Oblivious Set TransferEfficient Disjointness Tests for Private DatasetsAn Efficient and Provably Secure Private Polynomial Evaluation SchemeOn actively secure fine-grained access structures from isogeny assumptionsVector commitments over rings and compressed \(\varSigma \)-protocolsUniversally composable \(\varSigma \)-protocols in the global random-oracle modelUNCONDITIONALLY SECURE FAIR (t-n)-SECRET SHARING SCHEMEZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?PointProofs, revisitedEndemic oblivious transfer via random oracles, revisitedNetwork-agnostic security comes (almost) for free in DKG and MPCSnowblind: a threshold blind signature in pairing-free groupsImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesSimplified Submission of Inputs to ProtocolsProperty-Based Attestation without a Trusted Third PartyBlind Identity-Based Encryption and Simulatable Oblivious TransferS-money: virtual tokens for a relativistic economyEfficient non-malleable commitment schemesEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSChameleon-Hashes with Ephemeral TrapdoorsRemoving Erasures with Explainable Hash Proof SystemsScalable Multi-party Private Set-IntersectionSublinear Zero-Knowledge Arguments for RAM ProgramsRemoving the Strong RSA Assumption from Arguments over the IntegersEfficient non-malleable commitment schemesBeyond honest majority: the round complexity of fair and robust multi-party computationA Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorFair Traceable Multi-Group SignaturesEfficient Simultaneous BroadcastEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesOn the exact round complexity of secure three-party computationZero-Knowledge Sets with Short ProofsTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsA Commitment-Consistent Proof of a ShuffleEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionUnifying Zero-Knowledge Proofs of KnowledgePublic Verifiability from Pairings in Secret Sharing SchemesBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesPublicly Verifiable Secret Sharing for Cloud-Based Key ManagementA Federated Digital Identity Management Approach for Business ProcessesHow to obtain full privacy in auctionsConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsEfficiency Preserving Transformations for Concurrent Non-malleable Zero KnowledgeUnnamed ItemOn Application of Elliptic Curves in Some Electronic Voting ProtocolsA Verifiable Secret Sharing Scheme Based on the Chinese Remainder TheoremEfficient Round-Optimal Blind Signatures in the Standard ModelDecentralized Anonymous MicropaymentsHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerNon-interactive Secure 2PC in the Offline/Online and Batch SettingsPractical Schnorr threshold signatures without the algebraic group model




This page was built for publication: