scientific article; zbMATH DE number 1942438
From MaRDI portal
Publication:4409137
zbMath1026.94544MaRDI QIDQ4409137
Emmanuel Bresson, Michael Szydlo, Jacques Stern
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420465.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Short Attribute-Based Signatures for Threshold Predicates, Compressing proofs of \(k\)-out-of-\(n\) partial knowledge, Stronger notions and a more efficient construction of threshold ring signatures, Unconditionally anonymous ring and mesh signatures, One-time traceable ring signatures, A new ring signature scheme with signer-admission property, Logarithmic-size ring signatures with tight security from the DDH assumption, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, A multivariate based threshold ring signature scheme, Efficient traceable ring signature scheme without pairings, How to Leak a Secret and Reap the Rewards Too, Extendable threshold ring signatures with enhanced anonymity, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Cryptanalysis of multivariate threshold ring signature schemes, Multi-signatures for ECDSA and its applications in blockchain, Efficient proofs of knowledge for threshold relations, Count me in! Extendability for threshold ring signatures, Logarithmic-size (linkable) threshold ring signatures in the plain model, Threshold signatures with private accountability, Non-interactive composition of sigma-protocols via Share-then-Hash, Acyclicity programming for sigma-protocols, Leakage-resilient ring signature schemes, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Two new identity-based threshold ring signature schemes, Identity-based ring signatures from RSA, Identity-based quotable ring signature, An efficient ring signature scheme from pairings, Hidden attribute-based signatures without anonymity revocation, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Policy controlled system with anonymity, Certificate-free \textit{ad hoc} anonymous authentication, Certificateless threshold ring signature, Collusion-resistant convertible ring signature schemes, The ring authenticated encryption scheme-how to provide a clue wisely, Threshold ring signatures: new definitions and post-quantum security, Ring signatures: Stronger definitions, and constructions without random oracles