Author of the publication

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.

, , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 437-467. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach., , , , , , , , , and 1 other author(s). SAFECOMP Workshops, volume 12853 of Lecture Notes in Computer Science, page 39-51. Springer, (2021)Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting., , and . J. Cryptol., 37 (2): 12 (June 2024)(Inner-Product) Functional Encryption with Updatable Ciphertexts., , , , and . J. Cryptol., 37 (1): 8 (March 2024)Updatable Signatures and Message Authentication Codes., , , , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 691-723. Springer, (2021)Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based., , , and . NDSS, The Internet Society, (2019)Practical Group-Signatures with Privacy-Friendly Openings., , and . ARES, page 10:1-10:10. ACM, (2019)Muckle+: End-to-End Hybrid Authenticated Key Exchanges., , and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 601-633. Springer, (2023)Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model., , , and . IACR Cryptol. ePrint Arch., (2020)Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 64-85. Springer, (2021)Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model., , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 437-467. Springer, (2022)