Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
13
views
32
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,908
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Artificial Intelligence in Medicine
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption
other
Author(s):
Benoît Libert
,
Thomas Peters
,
Chen Qian
Publication date
(Online):
August 07 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
32
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Random oracles are practical
Mihir Bellare
,
Phillip Rogaway
(1993)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
Amos Fiat
,
Adi Shamir
(2006)
0
comments
Cited
82
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
Mihir Bellare
,
Phillip Rogaway
(1996)
0
comments
Cited
77
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 07 2018
Pages
: 288-308
DOI:
10.1007/978-3-319-98989-1_15
SO-VID:
d5e0ca92-f36c-44d9-a962-63c404f22548
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Dependencies in Formal Mathematics: Applications and Extraction for Coq and Mizar
pp. 1
Personalization in Digital Libraries – An Extended View
pp. 1
Design of Network Topology in an Adversarial Environment
pp. 1
Addressing the Classification with Imbalanced Data: Open Problems and New Challenges on Class Distribution
pp. 1
Modelling and Analysing ERTMS L3 Moving Block Railway Signalling with Simulink and Uppaal SMC
pp. 1
A Programming Tutor for Haskell
pp. 3
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
pp. 13
An Accessibility Evaluation of Social Media Websites for Elder Adults
pp. 13
A Systematic Approach to Safety Case Maintenance
pp. 21
A Pattern Approach to Conquer the Data Complexity in Simulation Workflow Design
pp. 16
IoT for BPMers. Challenges, Case Studies and Successful Applications
pp. 24
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study
pp. 27
Report on CLEF-2001 Experiments: Effective Combined Query-Translation Approach
pp. 28
Fundamental systems concepts: “The right stuff” for 21st Century technology
pp. 33
Negotiating the Semantic Gap: From Feature Maps to Semantic Landscapes
pp. 34
UCHILSIM: A Dynamically and Visually Realistic Simulator for the RoboCup Four Legged League
pp. 39
Towards Improving Dependability of Automotive Systems by Using the EAST-ADL Architecture Description Language
pp. 20
The Application of Augmented Reality to Design Education
pp. 30
Ordered Coloring Grids and Related Graphs
pp. 36
A Tale of Six Countries: eParticipation Research from an Administration and Political Perspective
pp. 39
Utilizing spatial relations for natural language access to an autonomous mobile robot
pp. 42
From Laser Data to Parametric Models: Towards an Automatic Method for Building Façade Modelling
pp. 56
What Are People Doing About XAI User Experience? A Survey on AI Explainability Research and Practice
pp. 76
Towards a Logic Query Language for Data Mining
pp. 40
Using Smart Connectors to Resolve Partial Matching Problems in COTS Component Acquisition
pp. 77
Representation in Evolutionary Computation
pp. 80
Search-Based Model Optimization Using Model Transformations
pp. 94
Machine Learning-Based Restart Policy for CDCL SAT Solvers
pp. 104
Towards Alternative Approaches to Reasoning About Goals
pp. 339
Parallel and Concurrent Programming in Haskell
pp. 44
The main conjecture for MDS codes
pp. 68
The Synergy of 3D SIFT and Sparse Codes for Classification of Viewpoints from Echocardiogram Videos
pp. 100
Performance Evaluation of OpenMP Applications with Nested Parallelism
pp. 101
Data Decision Diagrams for Petri Net Analysis
pp. 126
Self-adaptive UIs: Integrated Model-Driven Development of UIs and Their Adaptations
pp. 77
UT Austin Villa: RoboCup 2012 3D Simulation League Champion
pp. 103
The FRENK Datasets of Socially Unacceptable Discourse in Slovene and English
pp. 112
Evaluation of P2P Search Algorithms for Discovering Trust Paths
pp. 127
A Hybrid Diagnosis Approach Combining Black-Box and White-Box Reasoning
pp. 50
T3: A Classification Algorithm for Data Mining
pp. 88
A hybrid system with datalog and concept languages
pp. 134
Verification of Railway Interlocking - Compositional Approach with OCRA
pp. 99
A Polynomial Time Approximation Scheme for the Closest Substring Problem
pp. 127
User-Guided Large Attributed Graph Clustering with Multiple Sparse Annotations
pp. 128
Shrinking the Genotype: L-systems for EHW?
pp. 130
A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context
pp. 139
PrOnto: Privacy Ontology for Legal Reasoning
pp. 87
Technical Indicators for Forex Forecasting: A Preliminary Study
pp. 134
A Theory of Intentions for Intelligent Agents
pp. 141
Identification in the Limit with Probability One of Stochastic Deterministic Finite Automata
pp. 176
The International Data Spaces Information Model – An Ontology for Sovereign Exchange of Digital Content
pp. 132
Minimal elimination ordering inside a given chordal graph
pp. 133
Making Universal Induction Efficient by Specialization
pp. 134
Secure Hadoop with Encrypted HDFS
pp. 192
Approximate Subtree Identification in Heterogeneous XML Documents Collections
pp. 261
Freshness assurance of authentication protocols
pp. 353
Reverse k Nearest Neighbor and Reverse Farthest Neighbor Search on Spatial Networks
pp. 126
Exercise My Game: Turning Off-The-Shelf Games into Exergames
pp. 167
The formal definition of modula-2 and its associated interpreter
pp. 204
Syntactical analysis of total termination
pp. 288
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption
pp. 304
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption
pp. 141
How Users Perceive Content-Based Image Retrieval for Identifying Skin Images
pp. 141
The ABC’s of Online Community
pp. 191
Feedback in Context: Supporting the Evolution of IT-Ecosystems
pp. 217
InfoHarness: Use of automatically generated metadata for search and retrieval of heterogeneous information
pp. 314
Generic Middleware Substrate Through Modelware
pp. 347
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
pp. 136
Considerations on Efficient Touch Interfaces – How Display Size Influences the Performance in an Applied Pointing Task
pp. 137
Scout: A Source-to-Source Transformator for SIMD-Optimizations
pp. 172
Multi-scale DenseNet-Based Electricity Theft Detection
pp. 179
Detection and Segmentation of Brain Tumors from MRI Using U-Nets
pp. 198
Automatic Time Series Forecasting with GRNN: A Comparison with Other Models
pp. 296
Logics of mental attitudes in AI
pp. 318
A corrected failure-divergence model for CSP in Isabelle/HOL
pp. 211
AR-Alarm: An Adaptive and Robust Intrusion Detection System Leveraging CSI from Commodity Wi-Fi
pp. 348
Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
pp. 84
Semantic Web Conference Ontology - A Refactoring Solution
pp. 147
Grid Services for HLA-Based Distributed Simulation Frameworks
pp. 227
Supporting Accessibility in Higher Education Information Systems: A 2016 Update
pp. 235
Rational Choice of Security Measures Via Multi-parameter Attack Trees
pp. 283
Some issues in the design of market-oriented agents
pp. 222
IoT Monitoring of Water Consumption for Irrigation Systems Using SEMMA Methodology
pp. 238
Playing Robot Soccer under Natural Light: A Case Study
pp. 260
SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism
pp. 321
Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B
pp. 265
Inferability of Closed Set Systems from Positive Data
pp. 442
Implementing a model checker for LEGO
pp. 701
Scalable Zero Knowledge with No Trusted Setup
pp. 248
Making Recommendations for Groups Using Collaborative Filtering and Fuzzy Majority
pp. 254
Webots: Symbiosis Between Virtual and Real Mobile Robots
pp. 393
Efficient Decentralized Deep Learning by Dynamic Model Averaging
pp. 429
Transforming relational database schemas into object-oriented schemas according to ODMG-93
pp. 489
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting
pp. 297
Single Sample Face Recognition by Sparse Recovery of Deep-Learned LDA Features
pp. 278
Anticipating Depression Based on Online Social Media Behaviour
pp. 322
Overview of the CLEF eHealth Evaluation Lab 2019
pp. 406
Designing the McCAT compiler based on a family of structured intermediate representations
pp. 290
Peptide Computing - Universality and Complexity
pp. 241
Ludic Engagement Designs: Creating Spaces for Playful Learning
pp. 274
UBI-AMI: Real-Time Metering of Energy Consumption at Homes Using Multi-Hop IP-based Wireless Sensor Networks
pp. 288
INKA: The next generation
pp. 335
Apache Spark Streaming, Kafka and HarmonicIO: A Performance Benchmark and Architecture Comparison for Enterprise and Scientific Computing
pp. 259
Evaluation and Usability of Back Translation for Intercultural Communication
pp. 358
Deep Retinal Diseases Detection and Explainability Using OCT Images
pp. 313
Improving Matching Process in Social Network Using Implicit and Explicit User Information
pp. 461
Robust Stimulus Encoding in Olfactory Processing: Hyperacuity and Efficient Signal Transmission
pp. 351
Hybrid interactive theorem proving using nuprl and HOL
pp. 273
Purposeful Authoring for Emergent Narrative
pp. 315
Towards a Monitoring Interface Specification for Distributed Java Applications
pp. 448
Composite Indicators for Business Intelligence
pp. 462
Program transformations and WAM-support for the compilation of definite metaprograms
pp. 575
Context-Aware Analysis of Past Process Executions to Aid Resource Allocation Decisions
pp. 403
A user identification system using signature written with mouse
pp. 564
Ageing, Technology Anxiety and Intuitive Use of Complex Interfaces
pp. 414
Active Support for Query Formulation in Virtual Digital Libraries: A Case Study with DAFFODIL
pp. 446
Informality Judgment at Sentence Level and Experiments with Formality Score
pp. 462
Adaptive Memetic Algorithm Based Evolutionary Multi-tasking Single-Objective Optimization
pp. 219
A Simple Spanish Part of Speech Tagger for Detection and Correction of Accentuation Error
pp. 408
Mobile Cloud Computing in Healthcare System
pp. 394
System Software for Flash Memory: A Survey
pp. 496
GROUP: A Gossip Based Building Community Protocol
pp. 333
Automatic Landmarking of Cephalograms by Cellular Neural Networks
pp. 489
Image processing techniques for crowd density estimation using a reference image
pp. 571
Estimating Risk of Picking a Sentence for Document Summarization
pp. 485
Modular Emulation as a Viable Preservation Strategy
pp. 606
Segmentation of Brain Tumors in Multi-parametric MR Images via Robust Statistic Information Propagation
pp. 483
Using Design-Level Scan to Improve FPGA Design Observability and Controllability for Functional Verification
pp. 467
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
pp. 516
Chinese Utterance Segmentation in Spoken Language Translation
pp. 626
Using Back Propagation Algorithm and Genetic Algorithm to Train and Refine Neural Networks for Object Detection
pp. 480
Extended Star Clustering Algorithm
pp. 670
Toward an Undergraduate League for RoboCup
pp. 710
3D Lunar Terrain Reconstruction from Apollo Images
pp. 413
Delay PCNN and Its Application for Optimization
pp. 735
Automated Solving of the DEDS Control Problems
pp. 930
Weakly-Supervised Violence Detection in Movies with Audio and Video Based Co-training
pp. 809
Learning Situation Dependent Success Rates of Actions in a RoboCup Scenario
pp. 1058
Voice User Interface Design for a Telephone Application Using VoiceXML
pp. 994
NIRS Trajectories in Oxy-Deoxy Hb Plane and the Trajectory Map to Understand Brain Activities Related to Human Interface
pp. 844
Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent’s Intentions
pp. 1078
Biomass Inferential Sensor Based on Ensemble of Models Generated by Genetic Programming
pp. 1145
A Novel Self-navigated Inspection Robot along High-Voltage Power Transmission Line and Its Application
pp. 1214
Fault Tolerant Wide-Area Parallel Computing
Similar content
3,908
The Factor Causing Poor Results in Late Developmental Dysplasia of the Hip (DDH)
Authors:
Eamsobhana
Epidemiology and classification of DDH and torsional deviations of the hip joint
Authors:
D Tönnis
,
A Heinecke
Adaptively Secure Single Secret Leader Election from DDH
Authors:
Dario Catalano
,
Dario Fiore
,
Emanuele Giunta
See all similar
Cited by
4
Ring Signatures: Logarithmic-Size, No Setup—from Standard Assumptions
Authors:
Michael Backes
,
Nico Döttling
,
Lucjan Hanzlik
…
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Authors:
Tsz Hon Yuen
,
Muhammed F. Esgin
,
Joseph K. Liu
…
Compact Ring Signatures from Learning with Errors
Authors:
Rohit Chatterjee
,
Sanjam Garg
,
Mohammad Hajiabadi
…
See all cited by