ring signature |
6 |
anonymity |
4 |
artificial intelligence |
4 |
bilinear pairings |
4 |
generic construction |
4 |
linkable |
4 |
privacy |
4 |
ring signatures |
4 |
threshold ring signatures |
4 |
anonymous authentication |
3 |
auxiliary inputs |
3 |
cloud computing |
3 |
computation efficiency |
3 |
efficiency improvement |
3 |
hierarchical identity-based cryptosystem |
3 |
identity-based encryption |
3 |
key escrow |
3 |
public key encryption |
3 |
related-key attack |
3 |
reputation systems |
3 |
security of data |
3 |
service provider |
3 |
side channel attack |
3 |
signcryption |
3 |
signing key |
3 |
third parties |
3 |
access control |
2 |
anonymous access |
2 |
attribute-based |
2 |
attributes |
2 |
authentication |
2 |
blockchain |
2 |
certificate based |
2 |
certificateless public key encryption |
2 |
computer programming languages |
2 |
convertible undeniable signature |
2 |
digital signatures |
2 |
dual system encryption |
2 |
dynamic threshold public key encryption |
2 |
ecdsa |
2 |
electric vehicles |
2 |
ibe |
2 |
id-based cryptography |
2 |
information analysis |
2 |
k-times |
2 |
key-exposure |
2 |
leakage-resilience |
2 |
leakage-resilient |
2 |
learning systems |
2 |
linkability |
2 |
location privacy-preserving |
2 |
m-lwe/sis |
2 |
management information systems |
2 |
mathematical models |
2 |
mobile social networks |
2 |
pairing |
2 |
pairings |
2 |
personal health record |
2 |
points of interests |
2 |
random oracle model |
2 |
random oracles |
2 |
randomness |
2 |
related-randomness attack |
2 |
reservation |
2 |
revocable |
2 |
schnorr signature |
2 |
sharing |
2 |
signatures |
2 |
sum argument |
2 |
threshold |
2 |
threshold signature |
2 |
vehicular sensor networks |
2 |
accountability |
1 |
address |
1 |
anonymous ciphertext indistinguishability |
1 |
argument of knowledge |
1 |
attack |
1 |
attribute based encryption |
1 |
attribute-based encryption |
1 |
attribute-based keyword search |
1 |
attribute‐based encryption |
1 |
authorship binding |
1 |
bilinear groups |
1 |
blind signature |
1 |
cdh problem |
1 |
certificate-based signatures |
1 |
certificateless cryptography |
1 |
certificateless signatures |
1 |
chosen-ciphertext attack |
1 |
ciphertext-policy |
1 |
cloud storage |
1 |
complete non-malleability |
1 |
concurrent signature |
1 |
cryptographic security model |
1 |
databases |
1 |
encryption |
1 |
fair exchange |
1 |
forward security |
1 |
forward-secure |
1 |
gost |
1 |
guillou-quisquater signature |
1 |
identity-based |
1 |
identity-based cryptography |
1 |
identity-based signatures |
1 |
identity-based system |
1 |
iot systems |
1 |
leakage |
1 |
lightweight cryptography |
1 |
mobile e-commerce |
1 |
monero |
1 |
multi-authority |
1 |
multi-client |
1 |
multi-signature |
1 |
nizk |
1 |
non-interaction |
1 |
non-malleable key derivation |
1 |
one-more unforgeability |
1 |
one-time lossy filter |
1 |
outsourced computation |
1 |
plaintext-checkable encryption |
1 |
protocols |
1 |
publish/subscribe |
1 |
random oracle |
1 |
related-key attacks |
1 |
remove trusted setup |
1 |
revocation |
1 |
ring signature schemes |
1 |
rsa function |
1 |
sanitizable signatures |
1 |
searchable encryption |
1 |
security |
1 |
security proofs |
1 |
self-certificated signatures |
1 |
servers |
1 |
signature |
1 |
sm2 |
1 |
standard model |
1 |
strong known related key attack |
1 |
sun |
1 |
traceability |
1 |
universal composability |
1 |
verifiable random function |
1 |
vrf |
1 |
zero-knowledge proof |
1 |