Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4035740

zbMath0789.68047MaRDI QIDQ4035740

Birgit Pfitzmann, David Chaum, Eugène van Heyst

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (30)

Practical and Provably-Secure Commitment Schemes from Collision-Free HashingAttribute-based versions of Schnorr and ElGamalA provably secure non-iterative hash function resisting birthday attackGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyA New Non-Merkle-Damgård Structural Hash Function with Provable SecurityIdentity-based encryption in DDH hard groupsDakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyIdentity-based chameleon hashing and signatures without key exposureCCA updatable encryption against malicious re-encryption attacksProgrammable hash functions and their applicationsShort undeniable signatures based on group homomorphismsA characterization of chameleon hash functions and new, efficient designsCertificateless undeniable signature schemeNew \((t, n)\) threshold directed signature scheme with provable securityNew Constructions and Applications of Trapdoor DDH GroupsRate-Limited Secure Function Evaluation: Definitions and ConstructionsThreshold undeniable signature scheme based on conicFunctional encryption for cascade automataA Framework for Constructing Convertible Undeniable SignaturesVSH, an Efficient and Provable Collision-Resistant Hash FunctionCertificateless undeniable signatures from bilinear mapsProgrammable Hash Functions and Their ApplicationsOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesHash Functions from Sigma Protocols and Improvements to VSHFunctional Encryption for Cascade Automata (Extended Abstract)Short fail-stop signature scheme based on factorization and discrete logarithm assumptionsNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesDigital SignaturesSanitizable SignaturesA randomized analog of Chaum - van Antwerpen undeniable signature







This page was built for publication: