New Constructions and Applications of Trapdoor DDH Groups
From MaRDI portal
Publication:4916024
DOI10.1007/978-3-642-36362-7_27zbMath1314.94093OpenAlexW2109149410MaRDI QIDQ4916024
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_27
Related Items (5)
Trapdoor DDH groups from pairings and isogenies ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ An applications of signed quadratic residues in public key cryptography ⋮ Generic hardness of inversion on ring and its relation to self-bilinear map ⋮ New Constructions and Applications of Trapdoor DDH Groups
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- RSA-based undeniable signatures
- Short signatures from the Weil pairing
- New Convertible Undeniable Signature Schemes
- The Group of Signed Quadratic Residues and Applications
- Undeniable Signatures
- An attack on disguised elliptic curves
- Universally Composable Undeniable Signature
- Statistically Hiding Sets
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The Knowledge Complexity of Interactive Proof Systems
- Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Convertible Undeniable Signatures
- Reducing elliptic curve logarithms to logarithms in a finite field
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
- New Constructions and Applications of Trapdoor DDH Groups
- Advances in Cryptology – CRYPTO 2004
- 3-Move Undeniable Signature Scheme
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2005
- Algorithmic Number Theory
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: New Constructions and Applications of Trapdoor DDH Groups