Computational Diffie–Hellman assumption

Known as: Computational Diffie-Hellman assumption 
The computational Diffie–Hellman (CDH assumption) is the assumption that a certain computational problem within a cyclic group is hard. Consider a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2016
02419982016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data… (More)
  • table 1
Is this relevant?
2016
2016
In this paper, we present a new digital signature scheme based on the computational Diffie–Hellman (CDH) assumption in the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2010
2010
Attribute based signature (ABS) permits users produce signatures using any predicate of attributes issued from an attribute… (More)
Is this relevant?
2010
2010
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Currently, there are relatively few instances of “hash-and-sign” signatures in the standard model. Moreover, most current… (More)
Is this relevant?
2003
2003
Forward-secure signatures are used to defeat signature forgeries in cases of key exposure. In this model, the signature key… (More)
  • figure 1
  • table 3-1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
 
Is this relevant?