Concise ID-based mercurial functional commitments and applications to zero-knowledge sets (English)
- New search for: Wu, Chunhui
- New search for: Chen, Xiaofeng
- New search for: Susilo, Willy
- Further information on Susilo, Willy:
- https://orcid.org/0000-0002-1562-5105
- New search for: Wu, Chunhui
- New search for: Chen, Xiaofeng
- New search for: Susilo, Willy
- Further information on Susilo, Willy:
- https://orcid.org/0000-0002-1562-5105
In:
International Journal of Information Security
;
19
, 4
; 453-464
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
-
Contributors:
-
Published in:International Journal of Information Security ; 19, 4 ; 453-464
-
Publisher:
- New search for: Springer Berlin Heidelberg
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2019
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 19, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 343
-
Group rekeying based on member join historyTiloca, Marco / Dini, Gianluca / Rizki, Kiki / Raza, Shahid et al. | 2020
- 383
-
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding methodSeo, Minhye / Kim, Suhri / Lee, Dong Hoon / Park, Jong Hwan et al. | 2020
- 401
-
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocationHölzl, Michael / Roland, Michael / Mir, Omid / Mayrhofer, René et al. | 2020
- 419
-
Security analysis of secure kNN and ranked keyword search over encrypted dataOgata, Wakaha / Otemori, Takaaki et al. | 2020
- 427
-
Security attacks on smart grid scheduling and their defences: a game-theoretic approachPilz, M. / Naeini, F. Baghaei / Grammont, K. / Smagghe, C. / Davis, M. / Nebel, J.-C. / Al-Fagih, L. / Pfluegel, E. et al. | 2020
- 445
-
Secure implementations of a random bisection cutUeda, Itaru / Miyahara, Daiki / Nishimura, Akihiro / Hayashi, Yu-ichi / Mizuki, Takaaki / Sone, Hideaki et al. | 2020
- 453
-
Concise ID-based mercurial functional commitments and applications to zero-knowledge setsWu, Chunhui / Chen, Xiaofeng / Susilo, Willy et al. | 2020
- 465
-
DUEF-GA: data utility and privacy evaluation framework for graph anonymizationCasas-Roma, Jordi et al. | 2020
- 479
-
PDGuard: an architecture for the control and secure processing of personal dataMitropoulos, Dimitris / Sotiropoulos, Thodoris / Koutsovasilis, Nikos / Spinellis, Diomidis et al. | 2020