Sciweavers

13 search results - page 3 / 3
» An Efficient CDH-Based Signature Scheme with a Tight Securit...
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
13 years 9 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
ASIACRYPT
2006
Springer
13 years 9 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
13 years 10 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung