1-out-of-n Signatures from a Variety of Keys

From MaRDI portal
Publication:4412812


DOI10.1007/3-540-36178-2_26zbMath1065.94560OpenAlexW1484826441MaRDI QIDQ4412812

Miyako Ohkubo, Koutarou Suzuki, Masayuki Abe

Publication date: 16 July 2003

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36178-2_26



Related Items

DualRing: generic construction of ring signatures with efficient instantiations, Compact ring signatures from learning with errors, Revocable and Linkable Ring Signature, Unconditionally anonymous ring and mesh signatures, Distributed ring signatures from general dual access structures, Concurrent signatures from a variety of keys, The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures, Constant Size Ring Signature Without Random Oracle, A new ring signature scheme with signer-admission property, Logarithmic-size ring signatures with tight security from the DDH assumption, Group signatures and more from isogenies and lattices: generic, simple, and efficient, Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctions, One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model, Efficient traceable ring signature scheme without pairings, Efficient lattice-based traceable ring signature scheme with its application in blockchain, Speed-stacking: fast sublinear zero-knowledge proofs for disjunctions, A generic transform from multi-round interactive proof to NIZK, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, DualDory: logarithmic-verifier linkable ring signatures through preprocessing, Lattice-based signatures with tight adaptive corruptions and more, DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF, Universal ring signatures in the standard model, Ring signature scheme based on multivariate public key cryptosystems, Non-interactive composition of sigma-protocols via Share-then-Hash, Acyclicity programming for sigma-protocols, Two extensions of the ring signature scheme of Rivest-Shamir-Taumann, A New Efficient Threshold Ring Signature Scheme Based on Coding Theory, Property-Based Attestation without a Trusted Third Party, Concurrent signature without random oracles, Practical Range Proof for Cryptocurrency Monero with Provable Security, Self-organized Anonymous Authentication in Mobile Ad Hoc Networks, Identity-based ring signatures from RSA, Identity-based quotable ring signature, An efficient ring signature scheme from pairings, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Group signatures and more from isogenies and lattices: generic, simple, and efficient, Certificate-free \textit{ad hoc} anonymous authentication, Verifier-Key-Flexible Universal Designated-Verifier Signatures, Certificateless threshold ring signature, Collusion-resistant convertible ring signature schemes, Signatures from sequential-OR proofs, Threshold ring signatures: new definitions and post-quantum security, Legally Fair Contract Signing Without Keystones, More efficient digital signatures with tight multi-user security, Ring signatures: Stronger definitions, and constructions without random oracles, Efficient and tight oblivious transfer from PKE with tight multi-user security