Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024065 - MaRDI portal

scientific article; zbMATH DE number 1024065

From MaRDI portal
Publication:4341756

zbMath0878.68061MaRDI QIDQ4341756

Stefan Brands

Publication date: 14 December 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (38)

A practical anonymous payment scheme for electronic commerceA fair e-cash payment scheme based on creditAnonymous Communication and Anonymous CashAn Efficient Privacy-Preserving E-coupon SystemAnonymous Authentication with Spread RevelationEfficient traceable ring signature scheme without pairingsSecure electronic bills of lading: Blind counts and digital signaturesWeakening the Isolation Assumption of Tamper-Proof Hardware TokensPAPR: publicly auditable privacy revocation for anonymous credentialsA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensOn pairing-free blind signature schemes in the algebraic group modelThe Kernel Matrix Diffie-Hellman Assumption\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistImproved algebraic MACs and practical keyed-verification anonymous credentialsConditional e-payments with transferabilityCryptocash, cryptocurrencies, and cryptocontractsA practical anonymous multi-authority e-cash scheme.Prepaid electronic cheques using public-key certificatesLeakage-resilient ring signature schemesUser efficient recoverable off-line e-cash scheme with fast anonymity revokingBreaking and Fixing Anonymous Credentials for the CloudA synchronous quantum blind signature scheme with entanglement swappingSecurity of a sessional blind signature based on quantum cryptographA blind signature protocol with exchangeable signature sequenceAn escrow electronic cash system with limited traceabilityUnclonable Group IdentificationDavid and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareOn the (in)security of ROSOn the (in)security of ROSTransferable e-cash: a cleaner model and the first practical instantiationTowards a security model for computational puzzle schemesAccess with pseudonymsFounding Cryptography on Tamper-Proof Hardware TokensConverting normal DLP-based signatures into blindComment: A new blind signature based on the discrete logarithm problem for untraceabilityLattice-based blind signatures, revisitedBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model






This page was built for publication: