Author:
Boyle Elette,Goldwasser Shafi,Ivan Ioana
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Lecture Notes in Computer Science;S. Agrawal,2013
2. Backes, M., Meiser, S., Schröder, D.: Delegatable functional signatures. Cryptology ePrint Archive, Report 2013/408 (2013)
3. Lecture Notes in Computer Science;B. Barak,2001
4. Bellare, M., Fuchsbauer, G.: Policy-based signatures. Cryptology ePrint Archive, Report 2013/413 (2013)
5. Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: ITCS, pp. 326–349 (2012)
Cited by
254 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ad Hoc Broadcast, Trace, and Revoke;IACR Communications in Cryptology;2024-07-08
2. Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation;Proceedings of the 56th Annual ACM Symposium on Theory of Computing;2024-06-10
3. Periscoping: Private Key Distribution for Large-Scale Mixnets;IEEE INFOCOM 2024 - IEEE Conference on Computer Communications;2024-05-20
4. Holepunch: Fast, Secure File Deletion with Crash Consistency;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. Watermarking PRFs and PKE Against Quantum Adversaries;Journal of Cryptology;2024-04-26