The computational Diffie–Hellman (CDH assumption) is the assumption that a certain computational problem within a cyclic group is hard. Consider a… (More)

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

- Keita Emura
- ACISP
- 2017

Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data… (More)

Is this relevant?

2016

2016

- Jae Hong Seo
- Journal of Cryptology
- 2016

In this paper, we present a new digital signature scheme based on the computational Diffie–Hellman (CDH) assumption in the… (More)

Is this relevant?

2013

2013

- Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
- Journal of Cryptology
- 2013

We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several… (More)

Is this relevant?

2010

2010

- Swarun Kumar, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan
- EuroPKI
- 2010

Attribute based signature (ABS) permits users produce signatures using any predicate of attributes issued from an attribute… (More)

Is this relevant?

2010

2010

- Jae Hyun Ahn, Matthew Green, Susan Hohenberger
- ACM Conference on Computer and Communications…
- 2010

An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can… (More)

Is this relevant?

Highly Cited

2009

Highly Cited

2009

- Susan Hohenberger, Brent Waters
- CRYPTO
- 2009

We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model… (More)

Is this relevant?

Highly Cited

2009

Highly Cited

2009

- Susan Hohenberger, Brent Waters
- EUROCRYPT
- 2009

Currently, there are relatively few instances of “hash-and-sign” signatures in the standard model. Moreover, most current… (More)

Is this relevant?

2003

2003

- Fei Hu, Chwan-Hwa John Wu, J. David Irwin
- IACR Cryptology ePrint Archive
- 2003

Forward-secure signatures are used to defeat signature forgeries in cases of key exposure. In this model, the signature key… (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Victor Shoup
- EUROCRYPT
- 2000

The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against… (More)

Is this relevant?

Highly Cited

1998