Author of the publication

Impossibility of Blind Signatures from One-Way Permutations.

, , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 615-629. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the complexity of blind signatures.. Darmstadt University of Technology, (2010)Functional Credentials., , , , , and . PoPETs, 2018 (2): 64-84 (2018)Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol., , , and . IACR Cryptology ePrint Archive, (2018)Efficient Sanitizable Signatures without Random Oracles., , , and . IACR Cryptology ePrint Archive, (2017)Nearly Optimal Verifiable Data Streaming (Full Version)., , , , , and . IACR Cryptology ePrint Archive, (2015)Security of Blind Signatures Revisited., and . IACR Cryptology ePrint Archive, (2011)Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations., and . TCC, volume 7194 of Lecture Notes in Computer Science, page 636-653. Springer, (2012)Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins., , and . ACM Conference on Computer and Communications Security, page 219-230. ACM, (2015)Ubic: Bridging the Gap between Digital Cryptography and the Physical World., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 56-75. Springer, (2014)Security of Verifiably Encrypted Signatures and a Construction without Random Oracles., and . Pairing, volume 5671 of Lecture Notes in Computer Science, page 17-34. Springer, (2009)