196 results on '"random oracle model"'
Search Results
2. State of the Art of Homomorphic Signature Schemes
3. From Identification to Signatures, Tightly: A Framework and Generic Transforms
4. Efficient Sanitizable Signatures Without Random Oracles
5. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
6. Legally Fair Contract Signing Without Keystones
7. Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
8. Universal Signature Aggregators
9. Primary-Secondary-Resolver Membership Proof Systems
10. Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
11. Divisible E-Cash Made Practical
12. Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
13. Authenticating Computation on Groups: New Homomorphic Primitives and Applications
14. Improved Short Lattice Signatures in the Standard Model
15. Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
16. DAA-Related APIs in TPM 2.0 Revisited
17. Certified Bitcoins
18. On the (In)security of Fischlin’s Paradigm
19. Tighter Reductions for Forward-Secure Signature Schemes
20. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications
21. Decentralized Attribute-Based Signatures
22. Digital Signatures
23. Dual Form Signatures: An Approach for Proving Security from Static Assumptions
24. On the Non-malleability of the Fiat-Shamir Transform
25. (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack
26. Efficient Two-Move Blind Signatures in the Common Reference String Model
27. Domain-Specific Pseudonymous Signatures for the German Identity Card
28. Lattice Signatures without Trapdoors
29. Optimal Security Proofs for Full Domain Hash, Revisited
30. Deniable RSA Signature : The Raise and Fall of Ali Baba
31. Threshold and Revocation Cryptosystems via Extractable Hash Proofs
32. Signatures Resilient to Continual Leakage on Memory and Computation
33. Hidden Credential Retrieval without Random Oracles
34. Hybrid Signcryption
35. Signcryption Schemes Based on Bilinear Maps
36. One Time Anonymous Certificate: X.509 Supporting Anonymity
37. A Group Signature Scheme from Lattice Assumptions
38. How to Construct Identity-Based Signatures without the Key Escrow Problem
39. Fully Secure Threshold Unsigncryption
40. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model
41. Group Message Authentication
42. The Fiat–Shamir Transform for Group and Ring Signature Schemes
43. Multiple Denominations in E-cash with Compact Transaction Data
44. Survey: Leakage Resilience and the Bounded Retrieval Model
45. Confidential Signatures and Deterministic Signcryption
46. Leakage-Resilient Signatures
47. Full-Domain Hash (and Related) Signature Schemes
48. Signature Schemes from Identification Schemes
49. The Random Oracle Model
50. Online/Offline Ring Signature Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.