Amanote Research

Amanote Research

    RegisterSign In

Equivocal Blind Signatures and Adaptive UC-Security

doi 10.1007/978-3-540-78524-8_19
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Aggelos KiayiasHong-Sheng Zhou
Publisher

Springer Berlin Heidelberg


Related search

Security of Blind Signatures Revisited

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Two-Party (Blind) Ring Signatures and Their Applications

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Blind Adaptive Multiuser Detection

IEEE Transactions on Information Theory
Computer Science ApplicationsInformation SystemsLibraryInformation Sciences
1995English

Adaptive Transmitter Optimization for Blind and Group-Blind Multiuser Detection

IEEE Transactions on Signal Processing
Electronic EngineeringSignal ProcessingElectrical
2003English

The Social Security Act and the Blind

Journal of Visual Impairment and Blindness
OphthalmologyRehabilitation
1935English

Adaptive User-Centered Security

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Generalized ID-based Blind Signatures From Bilinear Pairings

2008English

On Tight Security Proofs for Schnorr Signatures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Requirements and Specifications for Adaptive Security

2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy