Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
69
views
20
references
Top references
cited by
43
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,187
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2006
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
other
Author(s):
Jens Groth
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
New Psychiatry
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(2005)
0
comments
Cited
153
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh
,
Eu-Jin Goh
,
Kobbi Nissim
(2005)
0
comments
Cited
139
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Non-interactive zero-knowledge and its applications
Manuel R Blum
,
Paul A Feldman
,
Silvio Micali
(1988)
0
comments
Cited
97
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 444-459
DOI:
10.1007/11935230_29
SO-VID:
0a629c8f-ab1c-4180-a256-9080b3568a96
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 194
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
pp. 37
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
pp. 84
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity
pp. 161
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
pp. 178
On the Generic Construction of Identity-Based Signatures with Additional Properties
pp. 299
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
pp. 444
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Similar content
1,187
New constructions of reusable designated-verifier NIZKs
Authors:
A. Lombardi
,
W Quach
,
RD Rothblum
…
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Authors:
Eike Kiltz
,
Hoeteck Wee
NIZKs with an untrusted CRS: security in the face of parameter subversion
Authors:
Bellare
See all similar
Cited by
43
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Authors:
Jens Groth
On the Size of Pairing-Based Non-interactive Arguments
Authors:
Jens Groth
Attribute-Based Signatures
Authors:
Hemanta Maji
,
Manoj Prabhakaran
,
Mike Rosulek
See all cited by