Fully Structure-Preserving Signatures and Shrinking Commitments
暂无分享,去创建一个
[1] Maria Dubovitskaya. Cryptographic Protocols for Privacy-Preserving Access Control in Databases , 2014 .
[2] Moti Yung,et al. Group Encryption: Non-interactive Realization in the Standard Model , 2009, ASIACRYPT.
[3] Masayuki Abe. Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings , 2010, ASIACRYPT.
[4] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[5] Masayuki Abe,et al. Group to Group Commitments Do Not Shrink , 2012, EUROCRYPT.
[6] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[7] Mehdi Tibouchi,et al. Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures , 2014, IACR Cryptol. ePrint Arch..
[8] Hovav Shacham,et al. Randomizable Proofs and Delegatable Anonymous Credentials , 2009, CRYPTO.
[9] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[10] Rosario Gennaro,et al. Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results , 2008, Public Key Cryptography.
[11] Amit Sahai,et al. Efficient Noninteractive Proof Systems for Bilinear Groups , 2008, SIAM J. Comput..
[12] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[13] Georg Fuchsbauer,et al. Commuting Signatures and Verifiable Encryption , 2011, EUROCRYPT.
[14] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[15] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[16] Mehdi Tibouchi,et al. Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds , 2016, IET Inf. Secur..
[17] Toshiaki Tanaka,et al. On the Existence of 3-Round Zero-Knowledge Protocols , 1998, CRYPTO.
[18] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[19] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[20] Abe Masayuki. Fully Structure-Preserving Signatures and Shrinking Commitments , 2015 .
[21] Masayuki Abe,et al. A Framework for Universally Composable Non-committing Blind Signatures , 2009, ASIACRYPT.
[22] Jan Camenisch,et al. A Framework for Practical Universally Composable Zero-Knowledge Protocols , 2011, IACR Cryptol. ePrint Arch..
[23] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[24] Payman Mohassel,et al. One-Time Signatures and Chameleon Hash Functions , 2010, Selected Areas in Cryptography.
[25] Jan Camenisch,et al. On the Impossibility of Structure-Preserving Deterministic Primitives , 2014, TCC.
[26] Jens Groth,et al. Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups , 2011, CRYPTO.
[27] Mihir Bellare,et al. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles , 2007, Public Key Cryptography.
[28] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[29] Georg Fuchsbauer,et al. Structure-Preserving Signatures and Commitments to Group Elements , 2010, CRYPTO.
[30] Marc Fischlin,et al. Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors , 2005, CRYPTO.
[31] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[32] Mehdi Tibouchi,et al. Structure-Preserving Signatures from Type II Pairings , 2014, CRYPTO.
[33] Ryo Nishimaki,et al. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions , 2012, Journal of Cryptology.
[34] Vincent Naessens,et al. Structure Preserving CCA Secure Encryption and Applications , 2011, ASIACRYPT.
[35] Jens Groth,et al. Separating Short Structure-Preserving Signatures from Non-interactive Assumptions , 2011, ASIACRYPT.
[36] Jens Groth,et al. Fully Anonymous Group Signatures without Random Oracles , 2007, IACR Cryptol. ePrint Arch..
[37] Markulf Kohlweiss,et al. Malleable Signatures: New Definitions and Delegatable Anonymous Credentials , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[38] Silvio Micali,et al. Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.
[39] Sanjit Chatterjee,et al. Type 2 Structure-Preserving Signature Schemes Revisited , 2014, ASIACRYPT.
[40] Sarah Meiklejohn,et al. An Extension of the Groth-Sahai Proof System , 2009 .
[41] Markulf Kohlweiss,et al. P-signatures and Noninteractive Anonymous Credentials , 2008, TCC.