Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1394309 - MaRDI portal

scientific article; zbMATH DE number 1394309

From MaRDI portal
Publication:4934724

zbMath0951.94532MaRDI QIDQ4934724

Josh Benaloh, M. de Mare

Publication date: 31 January 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Cryptanalysis of a dynamic universal accumulator over bilinear groupsMulti-party revocation in sovrin: performance through distributed trustUC Updatable Databases and ApplicationsCan Montgomery parasites be avoided? A design methodology based on key and cryptosystem modificationsCompressing proofs of \(k\)-out-of-\(n\) partial knowledgeNew Generation of Secure and Practical RSA-Based SignaturesZero-knowledge proofs for set membership: efficient, succinct, modularStronger notions and a more efficient construction of threshold ring signaturesA New Approach to Efficient Revocable Attribute-Based Anonymous CredentialsDynamic universal accumulator with batch update over bilinear groupsDatabase Outsourcing with Hierarchical Authenticated Data StructuresLogarithmic-size ring signatures with tight security from the DDH assumptionDecentralized policy-hiding ABE with receiver privacyMerkle trees optimized for stateless clients in bitcoinLattice-based accumulator with constant time list update and constant time verificationFunctional commitments for all functions, with transparent setup and from SISZero-Knowledge Accumulators and Set AlgebraMerkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practiceAn Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured ChannelsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsInner product functional commitments with constant-size public parameters and openingsLower bounds for the number of decryption updates in registration-based encryptionZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?Unnamed ItemSuccinct functional commitment for a large class of arithmetic circuitsKVaC: key-value commitments for blockchains and beyondIncrementally aggregatable vector commitments and applications to verifiable decentralized storageOn the (Ir)replaceability of global setups, or how (not) to use a global ledgerNon-malleable vector commitments via local equivocabilityVector and functional commitments from latticesEfficient attribute-based signature for monotone predicatesResource fairness and composability of cryptographic protocolsNew methods and abstractions for RSA-based forward secure signaturesVector Commitments and Their ApplicationsAn efficient conditionally anonymous ring signature in the random oracle modelEfficient authenticated data structures for graph connectivity and geometric search problemsZero-knowledge proofs for set membership: efficient, succinct, modularUnclonable Group IdentificationMulti-Identity Single-Key Decryption without Random OraclesNon-malleable vector commitments via local equivocability2D hash chain robust random key distribution schemeSecure Application Execution in Mobile DevicesMutative Identity-Based Signatures or Dynamic Credentials Without Random OraclesSuper-Efficient Verification of Dynamic Outsourced DatabasesStatistically Hiding SetsDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsNon-interactive timestamping in the bounded-storage modelGroup encryption: full dynamicity, message filtering and code-based instantiationEfficient Asynchronous Accumulators for Distributed PKIA symmetric cryptographic scheme for data integrity verification in cloud databasesNew constructions of hinting PRGs, OWFs with encryption, and moreNew code-based cryptographic accumulator and fully dynamic group signatureHow to sign digital streamsAn Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage ModelAuthenticated hash tables based on cryptographic accumulators