Author of the publication

Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model

, and . Electron. Colloquium Comput. Complex., (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aggregation of Gamma-Signatures and Applications to Bitcoin.. IACR Cryptology ePrint Archive, (2018)A New Framework for RFID Privacy., , , , and . IACR Cryptology ePrint Archive, (2010)Deniable Internet Key-Exchange., , , and . IACR Cryptology ePrint Archive, (2007)Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15., and . IACR Cryptology ePrint Archive, (2016)Reduction Zero-Knowledge., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 303-317. Springer, (2002)Resettable Zero-Knowledge in the Weak Public-Key Model., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 123-139. Springer, (2003)Concurrent Knowledge Extraction in Public-Key Models., , and . J. Cryptol., 29 (1): 156-219 (2016)Practical Constant-Size Ring Signature., , and . J. Comput. Sci. Technol., 33 (3): 533-541 (2018)Interactive Zero-Knowledge with Restricted Random Oracles., and . TCC, volume 3876 of Lecture Notes in Computer Science, page 21-40. Springer, (2006)Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage., and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 348-365. Springer, (2011)