Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
30
views
25
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,276
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
A Group Signature Scheme with Improved Efficiency (Extended Abstract)
other
Author(s):
Jan Camenisch
,
Markus Michels
Publication date
(Online):
September 24 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Future Science Group
Most cited references
25
Record
: found
Abstract
: not found
Article
: not found
Minimum disclosure proofs of knowledge
Gilles Brassard
,
David Chaum
,
Claude Crépeau
(1988)
0
comments
Cited
104
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Zero-knowledge proofs of identity
Amos Fiat
,
Adi Shamir
,
Uriel Feige
(1988)
0
comments
Cited
102
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The random oracle methodology, revisited (preliminary version)
Ran Canetti
,
Oded Goldreich
,
Shai Halevi
(1998)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2000
Publication date (Online):
September 24 2002
Pages
: 160-174
DOI:
10.1007/3-540-49649-1_14
SO-VID:
4ae80b48-cb57-417e-9eb2-665691b0caef
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 11
Generation of Shared RSA Keys by Two Parties
pp. 25
An Attack on RSA Given a Small Fraction of the Private Key Bits
pp. 35
C−+* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
pp. 50
ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture)
pp. 51
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
pp. 66
Efficient Implementation of Schoof’s Algorithm
pp. 80
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n
pp. 95
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
pp. 110
Elliptic Curve Discrete Logarithms and the Index Calculus
pp. 126
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
pp. 133
Improved Truncated Differential Attacks on SAFER
pp. 148
Optimal Resistance Against the Davies and Murphy Attack
pp. 160
A Group Signature Scheme with Improved Efficiency (Extended Abstract)
pp. 175
A Study on the Proposed Korean Digital Signature Algorithm
pp. 187
Cryptanalysis of the Original McEliece Cryptosystem
pp. 200
Improving the Security of the McEliece Public-Key Cryptosystem
pp. 214
Cryptanalysis in Prime Order Subgroups of Zn*
pp. 227
Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC
pp. 242
Bounds and Constructions for Multireceiver Authentication Codes
pp. 257
Fair Off-Line e-Cash Made Easy
pp. 271
Off-line Fair Payment Protocols using Convertible Signatures
pp. 286
Efficient Fair Exchange with Verifiable Confirmation of Signatures
pp. 300
Adaptively Secure Oblivious Transfer
pp. 315
ML-Sequences over Rings Z/(2e): I. Constructions of Nondegenerative ML-Sequences II. Injectivness of Compression Mappings of New Classes
pp. 327
Analysis Methods for (Alleged) RC4
pp. 342
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators
pp. 357
A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol
pp. 372
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto ’95 is not Secure
pp. 380
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract
pp. 392
Audio and Optical Cryptography
pp. 405
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement
pp. 420
Some Bounds and a Construction for Secure Broadcast Encryption
Similar content
1,276
Co-utilization of microalgae and heterotrophic microorganisms improves wastewater treatment efficiency
Authors:
Miiku Takahashi
,
Yukino Karitani
,
Ryosuke Yamada
…
CSIDH: An Efficient Post-Quantum Commutative Group Action
Authors:
Wouter Castryck
,
Tanja Lange
,
Chloe Martindale
…
Scaling up malaria intervention “packages” in Senegal: using cost effectiveness data for improving allocative efficiency and programmatic decision-making
Authors:
Sophie Faye
,
Altea Cico
,
Alioune Gueye
…
See all similar
Cited by
20
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Authors:
Jens Groth
Accumulators from Bilinear Pairings and Applications
Authors:
Lan Nguyen
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Authors:
Giuseppe Ateniese
,
Jan Camenisch
,
Marc P Joye
…
See all cited by