Sanitizable signatures, ESORICS 2005, vol.3679, pp.159-177, 2005. ,
Practical strongly invisible and strongly accountable sanitizable signatures, LNCS, vol.17, pp.437-452, 2017. ,
Short signatures from the Weil pairing, LNCS, vol.2248, pp.514-532, 2001. ,
Redactable signatures for tree-structured data: Definitions and constructions, LNCS, vol.10, pp.87-104, 2010. ,
Security of sanitizable signatures revisited, LNCS, vol.5443, pp.317-336, 2009. ,
Unlinkability of sanitizable signatures, PKC 2010, vol.6056, pp.444-461, 2010. ,
Non-interactive public accountability for sanitizable signatures, Public Key Infrastructures, Services and Applications, pp.178-193, 2013. ,
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures, Cryptology and Network Security, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01980172
Chameleon-hashes with ephemeral trapdoors-and applications to invisible sanitizable signatures, Part, vol.II, pp.152-182, 2017. ,
On extended sanitizable signature schemes, LNCS, vol.5985, pp.179-194, 2010. ,
Sanitizable signatures with several signers and sanitizers, LNCS, vol.12, pp.35-52, 2012. ,
Identity-based key agreement protocols from pairings, International Journal of Information Security, vol.6, issue.4, pp.213-241, 2007. ,
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, LNCS, vol.1462, pp.13-25, 1998. ,
A general framework for redactable signatures and new constructions, LNCS, vol.15, pp.3-19, 2016. ,
Invisible sanitizable signatures and public-key encryption are equivalent, Cryptology ePrint Archive, 2018. ,
Efficient unlinkable sanitizable signatures from signatures with rerandomizable keys, PKC 2016, Part I, vol.9614, pp.301-330, 2016. ,
A framework for unique ring signatures, Cryptology ePrint Archive, 2012. ,
Weakly secure equivalence-class signatures from standard assumptions, IACR International Workshop on Public Key Cryptography, pp.153-183, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01869971
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, vol.02, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01870052
Secure integration of asymmetric and symmetric encryption schemes, Journal of Cryptology, vol.26, issue.1, pp.80-101, 2013. ,
Traceable ring signature, LNCS, vol.4450, pp.181-200, 2007. ,
DOI : 10.1007/978-3-540-71677-8_13
, Pairings for cryptographers, vol.156, pp.3113-3121, 2008.
Structure-preserving signatures on equivalence classes and their application to anonymous credentials, ASIACRYPT 2014, Part I, vol.8873, pp.491-511, 2014. ,
DOI : 10.1007/978-3-662-45611-8_26
Programmable hash functions and their applications, LNCS, vol.5157, pp.21-38, 2008. ,
DOI : 10.1007/s00145-011-9102-5
URL : https://ir.cwi.nl/pub/19471/19471B.pdf
Homomorphic signatures for digital photographs, LNCS, vol.7035, pp.141-157, 2011. ,
DOI : 10.1007/978-3-642-27576-0_12
Homomorphic signature schemes, LNCS, vol.2271, pp.244-262, 2002. ,
Stronger security for sanitizable signatures, Data Privacy Management, and Security Assurance, pp.100-117, 2016. ,
DOI : 10.1007/978-3-319-29883-2_7
Efficient sanitizable signatures without random oracles, ESORICS 2016, Part I, vol.9878, pp.363-380, 2016. ,
Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract), LNCS, vol.3108, pp.325-335, 2004. ,
Verifiable ring signature, 2003. ,
Invisibly sanitizable digital signature scheme, IEICE TRANSACTIONS on Fundamentals of Electronics, 2008. ,
The kernel matrix Diffie-Hellman assumption, ASIACRYPT 2016, Part I, vol.10031, pp.729-758, 2016. ,
Extended proxy signatures for smart cards, Masahiro Mambo and Yuliang Zheng, vol.1729, pp.247-258, 1999. ,
DOI : 10.1007/3-540-47790-x_21
On updatable redactable signatures, LNCS, vol.14, pp.457-475, 2014. ,
An identity-based proxy signature scheme from pairings, ICICS 06, vol.4307, pp.60-71, 2006. ,
Efficient one-time proxy signatures, LNCS, vol.2894, pp.507-522, 2003. ,
Accountable ring signatures: A smart card approach, Smart Card Research and Advanced Applications VI, pp.271-286, 2004. ,