Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307246

DOI10.1007/b97182zbMath1122.94354OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307246

Xavier Boyen, Dan Boneh

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (only showing first 100 items - show all)

Generic Framework for Attribute-Based Group SignatureEfficient Non-interactive Range ProofReducing elliptic curve logarithms to logarithms in a finite fieldVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeAnonymous tokens with public metadata and applications to private contact tracingElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyLocally verifiable signature and key aggregationMultimodal private signaturesOptimal generic attack against basic Boneh-Boyen signaturesCHIP and CRISP: protecting all parties against compromise through identity-binding PAKEsHierarchical Attribute-Based SignaturesEfficient Traceable Oblivious Transfer and Its ApplicationsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingFully Anonymous Group Signatures Without Random OraclesIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksSecurity Analysis of the Strong Diffie-Hellman ProblemProgrammable Hash Functions and Their ApplicationsUnlinkable Randomizable Signature and Its Application in Group SignatureAmbiguous Optimistic Fair ExchangeEfficient Protocols for Set Membership and Range ProofsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesProxy Signatures Secure Against Proxy Key ExposureFaster and Shorter Password-Authenticated Key ExchangeDiscrete logarithm problems with auxiliary inputsGeneric constructions of integrated PKE and PEKSProxy Re-signature Schemes Without Random OraclesThe Twin Diffie-Hellman Problem and ApplicationsZero-Knowledge Sets with Short ProofsAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsDynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsRealizing Hash-and-Sign Signatures under Standard AssumptionsSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Random Functions from Identity-Based Key EncapsulationOn the Theoretical Gap between Group Signatures with and without UnlinkabilityNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionEfficient and Short Certificateless SignatureSanitizable Signatures RevisitedA Fuzzy ID-Based Encryption Efficient When Error Rate Is LowToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesOptimal Online/Offline Signature: How to Sign a Message without Online ComputationServer-Aided Verification Signatures: Definitions and New ConstructionsDigital SignaturesReal Hidden Identity-Based SignaturesGeneric construction for tightly-secure signatures from discrete logNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreStructure-preserving signatures and commitments to group elementsA reduction of security notions in designated confirmer signaturesA new universal designated verifier transitive signature scheme for big graph dataSecure data storage in cloud: an e-stream cipher-based secure and dynamic updation policyImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsUnconditionally anonymous ring and mesh signaturesSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSkipping the \(q\) in group signaturesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionDynamic universal accumulator with batch update over bilinear groupsA comparison of MNT curves and supersingular curvesCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringAnonymous single-sign-on for \(n\) designated services with traceabilityGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsOn succinct non-interactive arguments in relativized worldsOptimal tightness for chain-based unique signaturesKey regeneration-free ciphertext-policy attribute-based encryption and its applicationHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsEfficient and secure attribute-based signature for monotone predicatesShort signatures from Diffie-Hellman: realizing almost compact public keyAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesA Dynamic Attribute-Based Authentication SchemeLinearly homomorphic structure-preserving signatures and their applicationsThe random oracle model: a twenty-year retrospectiveHow to achieve non-repudiation of origin with privacy protection in cloud computingStrong key-insulated signature in the standard modelZero-Knowledge Accumulators and Set AlgebraTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsOn the bit security of the weak Diffie-Hellman problemA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionAutomated analysis of cryptographic assumptions in generic group modelsStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsShort signatures without random oracles and the SDH assumption in bilinear groupsForward-secure ID based digital signature scheme with forward-secure private key generatorImproved algebraic MACs and practical keyed-verification anonymous credentialsEfficient traceable signatures in the standard modelIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersPublic-key generation with verifiable randomnessGroup-oriented fair exchange of signaturesRecent progress on the elliptic curve discrete logarithm problemProvably secure server-aided verification signaturesA new provably secure certificateless short signature schemeOn the impossibility of purely algebraic signaturesPolicy-compliant signaturesEfficient oblivious transfers with access controlEfficient selective identity-based encryption without random oraclesAmbiguous optimistic fair exchange: definition and constructionsA provably secure short signature scheme based on discrete logarithmsPAChain: Private, Authenticated and Auditable Consortium BlockchainA characterization of chameleon hash functions and new, efficient designsSigncryption Schemes Based on the Diffie–Hellman ProblemSecure public-key encryption scheme without random oracles




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004