Author of the publication

Double-Authentication-Preventing Signatures in the Standard Model.

, , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 338-358. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures., and . IACR Cryptology ePrint Archive, (2008)Blind Schnorr Signatures in the Algebraic Group Model., , and . IACR Cryptology ePrint Archive, (2019)A Classification of Computational Assumptions in the Algebraic Group Model., , and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 121-151. Springer, (2020)Constrained PRFs for Unbounded Inputs with Short Keys., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 445-463. Springer, (2016)Efficient Rational Secret Sharing in Standard Communication Networks., , and . IACR Cryptology ePrint Archive, (2008)Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014.. IACR Cryptology ePrint Archive, (2014)BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme., , , and . ACM Conference on Computer and Communications Security, page 1614-1625. ACM, (2016)The One-More Discrete Logarithm Assumption in the Generic Group Model., , and . ASIACRYPT (4), volume 13093 of Lecture Notes in Computer Science, page 587-617. Springer, (2021)Transferable Constant-Size Fair E-Cash., , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 226-247. Springer, (2009)Fair Blind Signatures without Random Oracles., and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 16-33. Springer, (2010)