Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding
From MaRDI portal
Publication:6134227
DOI10.1007/978-3-031-29371-9_17OpenAlexW4361857814MaRDI QIDQ6134227
Unnamed Author, Shinsaku Kiyomoto, Kazuhide Fukushima
Publication date: 21 August 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-29371-9_17
invisibilityunlinkabilitydowngradable affine message authentication codesstrong context-hidingtrapdoor redactable signaturestrapdoor sanitizable signatures
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient invisible and unlinkable sanitizable signatures
- Downgradable identity-based encryption and applications
- Wildcarded identity-based encryption
- An Algebraic Framework for Diffie-Hellman Assumptions
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Computing on Authenticated Data
- Redactable Signatures for Independent Removal of Structure and Content
- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Trapdoor Sanitizable Signatures and Their Application to Content Protection
- Unlinkability of Sanitizable Signatures
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Trapdoor Sanitizable Signatures Made Easy
- Structure-Preserving Signatures and Commitments to Group Elements
- Identity-Based Encryption Gone Wild
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Security of Sanitizable Signatures Revisited
- Computing on Authenticated Data: New Privacy Definitions and Constructions
- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Automata, Languages and Programming
- Chameleon-Hashes with Ephemeral Trapdoors
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Sanitizable Signatures
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding