Several cryptographic applications of \(\Sigma\)-protocol
From MaRDI portal
Publication:473026
DOI10.1007/s11424-009-9162-xzbMath1300.94096OpenAlexW2084191607MaRDI QIDQ473026
Publication date: 21 November 2014
Published in: Journal of Systems Science and Complexity (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11424-009-9162-x
secret sharing\(\Sigma\)-protocolBlum integerdelegateable signatureuniversal designated verifier signaturewitness hiding protocolwitness indistinguishable protocol
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- Compact Group Signatures Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- The Knowledge Complexity of Interactive Proof Systems
- Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
- Foundations of Cryptography
- Advances in Cryptology – CRYPTO 2004
- Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)
- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
- On Signatures of Knowledge
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Several cryptographic applications of \(\Sigma\)-protocol