Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942438 - MaRDI portal

scientific article; zbMATH DE number 1942438

From MaRDI portal
Publication:4409137

zbMath1026.94544MaRDI QIDQ4409137

Emmanuel Bresson, Michael Szydlo, Jacques Stern

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Short Attribute-Based Signatures for Threshold Predicates, Compressing proofs of \(k\)-out-of-\(n\) partial knowledge, Stronger notions and a more efficient construction of threshold ring signatures, Unconditionally anonymous ring and mesh signatures, One-time traceable ring signatures, A new ring signature scheme with signer-admission property, Logarithmic-size ring signatures with tight security from the DDH assumption, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, A multivariate based threshold ring signature scheme, Efficient traceable ring signature scheme without pairings, How to Leak a Secret and Reap the Rewards Too, Extendable threshold ring signatures with enhanced anonymity, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Cryptanalysis of multivariate threshold ring signature schemes, Multi-signatures for ECDSA and its applications in blockchain, Efficient proofs of knowledge for threshold relations, Count me in! Extendability for threshold ring signatures, Logarithmic-size (linkable) threshold ring signatures in the plain model, Threshold signatures with private accountability, Non-interactive composition of sigma-protocols via Share-then-Hash, Acyclicity programming for sigma-protocols, Leakage-resilient ring signature schemes, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Two new identity-based threshold ring signature schemes, Identity-based ring signatures from RSA, Identity-based quotable ring signature, An efficient ring signature scheme from pairings, Hidden attribute-based signatures without anonymity revocation, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Policy controlled system with anonymity, Certificate-free \textit{ad hoc} anonymous authentication, Certificateless threshold ring signature, Collusion-resistant convertible ring signature schemes, The ring authenticated encryption scheme-how to provide a clue wisely, Threshold ring signatures: new definitions and post-quantum security, Ring signatures: Stronger definitions, and constructions without random oracles