Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759781 - MaRDI portal

scientific article; zbMATH DE number 1759781

From MaRDI portal
Publication:4536804

zbMath0995.94533MaRDI QIDQ4536804

Jean-Sébastien Coron

Publication date: 28 July 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

SoK: how (not) to design and implement post-quantum cryptographyAnother Look at TightnessMQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureOn the security of RSA textbook signature scheme on Paillier ciphertextMemory-Tight Reductions for Practical Key Encapsulation MechanismsBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesMulti-use and unidirectional identity-based proxy re-encryption schemesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionThe wonderful world of global random oraclesSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageLogarithmic-size ring signatures with tight security from the DDH assumptionKey regeneration-free ciphertext-policy attribute-based encryption and its applicationDigital Signatures with Memory-Tight Security in the Multi-challenge SettingChain Reductions for Multi-signatures and the HBMS SchemeCliptography: Clipping the Power of Kleptographic AttacksNew results and applications for multi-secret sharing schemesIdentity-Based Batch Provable Data PossessionOn tight security proofs for Schnorr signaturesA Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with AnonymityShort signatures without random oracles and the SDH assumption in bilinear groupsIdentity-based signature and extended forking algorithm in the multivariate quadratic settingThe price of verifiability: lower bounds for verifiable random functionsEfficient IBS from a new assumption in the multivariate-quadratic settingIdentity-based chameleon hashing and signatures without key exposureProgrammable hash functions and their applicationsThe cost of adaptivity in security games on graphsTowards tight adaptive security of non-interactive key exchangeAttribute-based signatures from RSAReflections on the security proofs of Boneh-Franklin identity-based encryption schemeShort undeniable signatures based on group homomorphismsGeneralized public-key cryptography with tight securityImproved proxy re-encryption schemes with applications to secure distributed storageNon-adaptive programmability of random oracleIdentity-based ring signatures from RSAOptimal security proofs for full domain hash. RevisitedAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksConfined guessing: new signatures from standard assumptionsProgrammable Hash Functions and Their ApplicationsHomomorphic Encryption and Signatures from Vector DecompositionPrivate set-intersection with common set-upSecurity of Digital Signature Schemes in Weakened Random Oracle ModelsAn enhanced \((t,n)\) threshold directed signature schemeAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyEfficient Sequential Aggregate Signed DataPublic Key Encryption with Searchable Keywords Based on Jacobi SymbolsThreshold RSA for Dynamic and Ad-Hoc GroupsStrengthening Security of RSA-OAEPTight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signaturesNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesVirtual Smart Cards: How to Sign with a Password and a ServerOn the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and ShachamEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityTowards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeGeneric groups, collision resistance, and ECDSAOn instantiating the algebraic group model from falsifiable assumptions