scientific article; zbMATH DE number 1088250
From MaRDI portal
Publication:4364567
zbMath0882.94018MaRDI QIDQ4364567
Markus A. Stadler, Jan Camenisch
Publication date: 10 March 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (81)
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources ⋮ A new dynamic group signature scheme ⋮ Structure-preserving signatures and commitments to group elements ⋮ A property-based attestation protocol for TCM ⋮ Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability ⋮ Off-Line Group Signatures with Smart Cards ⋮ Blind attribute-based encryption and oblivious transfer with fine-grained access control ⋮ UC-secure and Contributory Password-Authenticated Group Key Exchange ⋮ Set signatures and their applications ⋮ Issuer-hiding attribute-based credentials ⋮ Report and trace ring signatures ⋮ Selectively linkable group signatures -- stronger security and preserved verifiability ⋮ Group signature scheme based on verifiable random number ⋮ Anonymous single-sign-on for \(n\) designated services with traceability ⋮ Improved signature schemes for secure multi-party computation with certified inputs ⋮ ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines ⋮ Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability ⋮ Generalizing Efficient Multiparty Computation ⋮ Signatures and Efficient Proofs on Committed Graphs and NP-Statements ⋮ Shorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other Optimizations ⋮ Extending concurrent signature to multiple parties ⋮ Privacy-preserving blueprints ⋮ Asymmetric group message franking: definitions and constructions ⋮ Ring signatures with user-controlled linkability ⋮ NIWI and new notions of extraction for algebraic languages ⋮ What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable? ⋮ A universally composable non-interactive aggregate cash system ⋮ Dining Cryptographers with 0.924 Verifiable Collision Resolution ⋮ Improving the efficiency of report and trace ring signatures ⋮ Universally composable \(\varSigma \)-protocols in the global random-oracle model ⋮ Improved algebraic MACs and practical keyed-verification anonymous credentials ⋮ Succinct Diophantine-satisfiability arguments ⋮ Public-key generation with verifiable randomness ⋮ Practical dynamic group signatures without knowledge extractors ⋮ Interpolation of the Double Discrete Logarithm ⋮ A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model ⋮ Efficient attribute-based signature for monotone predicates ⋮ Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter ⋮ New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness ⋮ Property-Based Attestation without a Trusted Third Party ⋮ Certificate-Based Signature Schemes without Pairings or Random Oracles ⋮ Group Encryption ⋮ Blind Identity-Based Encryption and Simulatable Oblivious Transfer ⋮ The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem ⋮ Leakage-resilient group signature: definitions and constructions ⋮ An efficient ring signature scheme from pairings ⋮ Chameleon-Hashes with Ephemeral Trapdoors ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ Time-selective convertible undeniable signatures with short conversion receipts ⋮ Unlinkable Randomizable Signature and Its Application in Group Signature ⋮ Universally Composable Adaptive Oblivious Transfer ⋮ Efficient Protocols for Set Membership and Range Proofs ⋮ Secure and efficient multiparty private set intersection cardinality ⋮ Fair Traceable Multi-Group Signatures ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Escrow free attribute-based signature with self-revealability ⋮ Collusion-resistant convertible ring signature schemes ⋮ A novel quantum group signature scheme without using entangled states ⋮ An efficient and secure navigation protocol based on vehicular cloud ⋮ Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems ⋮ The Power of Anonymous Veto in Public Discussion ⋮ On the Portability of Generalized Schnorr Proofs ⋮ Towards Lightweight Anonymous Entity Authentication for IoT Applications ⋮ Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy ⋮ Counting fixed points and rooted closed walks of the singular map \(x \mapsto x^{x^n}\) modulo powers of a prime ⋮ Bandwidth-efficient threshold EC-DSA ⋮ On the Theoretical Gap between Group Signatures with and without Unlinkability ⋮ Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems ⋮ Foundations of Fully Dynamic Group Signatures ⋮ Compact E-Cash and Simulatable VRFs Revisited ⋮ Universally Composable Adaptive Priced Oblivious Transfer ⋮ Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials ⋮ Sanitizable Signatures Revisited ⋮ On the security of Miyaji et al. group signature scheme ⋮ An Efficient Self-blindable Attribute-Based Credential Scheme ⋮ Group signature schemes with forward secure properties ⋮ FAST: fair auctions via secret transactions ⋮ Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security ⋮ Two-sided malicious security for private intersection-sum with cardinality ⋮ A traceable group signature scheme. ⋮ SKC-CCCO: an encryption algorithm for quantum group signature
This page was built for publication: