Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942419 - MaRDI portal

scientific article; zbMATH DE number 1942419

From MaRDI portal
Publication:4409116

zbMath1026.94521MaRDI QIDQ4409116

Mihir Bellare, Adriana Palacio

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420162.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (30)

Two-round trip Schnorr multi-signatures via delinearized witnessesMuSig2: simple two-round Schnorr multi-signaturesTwin-Beth: security under active and concurrent attacks for the Beth identity-based identification schemeThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsHierarchical Deterministic Bitcoin Wallets that Tolerate Key LeakageThe One-More Discrete Logarithm Assumption in the Generic Group ModelChain Reductions for Multi-signatures and the HBMS SchemeHardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSAFrom Identification to Signatures, Tightly: A Framework and Generic TransformsEntanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based SignaturesAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelPractical Schnorr threshold signatures without the algebraic group modelOrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit lossIdentification scheme and forward-secure signature in identity-based setting from isogeniesA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortIdentification Schemes from Key Encapsulation MechanismsA new framework for the design and analysis of identity-based identification schemesImproved Zero-Knowledge Identification with LatticesIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsOne-Round ID-Based Blind Signature Scheme without ROS AssumptionSeparation Results on the “One-More” Computational ProblemsTell me the truth: practically public authentication for outsourced databases with multi-user modificationConcurrent Signatures with Fully Negotiable Binding ControlSecurity proofs for identity-based identification and signature schemesOptimal Security Proofs for Signatures from Identification SchemesSimple Schnorr multi-signatures with applications to bitcoinLattice-based blind signatures, revisitedBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model







This page was built for publication: