Author of the publication

On zero-knowledge proofs (extended abstract): "from membership to decision".

, , and . STOC, page 255-264. ACM, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage., , , and . USENIX Security Symposium, page 2353-2370. USENIX Association, (2022)Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model, and . Electron. Colloquium Comput. Complex., (2005)Linearly homomorphic structure-preserving signatures and their applications., , , and . Des. Codes Cryptogr., 77 (2-3): 441-477 (2015)Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption., , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 98-128. Springer, (2020)Threshold Cryptosystems Based on Factoring., and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 192-205. Springer, (2002)On the Security of ElGamal Based Encryption., and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 117-134. Springer, (1998)Self-tallying Elections and Perfect Ballot Secrecy., and . Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 141-158. Springer, (2002)General Group Authentication Codes and Their Relation to Ünconditionally-Secure Signatures"., , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 231-247. Springer, (2004)Adaptive Security for the Additive-Sharing Based Proactive RSA., , and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 240-263. Springer, (2001)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 423-442. Springer, (2013)