_id,doi,title
6430,10.1007/978-3-030-17259-6_11,Adaptively secure proxy re-encryption
6941,10.1007/978-3-662-58387-6_26,SpaceMint: A cryptocurrency based on proofs of space
1592,10.1007/s00145-014-9196-7,Structure preserving signatures and commitments to group elements
1225,10.1007/978-3-319-44618-9_21,Practical round-optimal blind signatures in the standard model from weaker assumptions
1229,10.1007/978-3-319-39555-5_16,Offline witness encryption
1233,10.1007/978-3-662-49096-9_12,Standard security does imply security against selective opening for markov distributions
1235,10.1007/978-3-319-39555-5_24,Constrained PRFs for unbounded inputs with short keys
1236,10.1007/978-3-319-29485-8_24,Constrained PRFs for unbounded inputs
1646,10.1007/978-3-662-46497-7_2,Key-homomorphic constrained pseudorandom functions
1647,10.1007/978-3-662-48000-7_12,Practical round-optimal blind signatures in the standard model
1648,10.1007/978-3-662-47989-6_29,A quasipolynomial reduction for generalized selective decryption on trees
1651,10.1007/978-3-662-46447-2_5,Anonymous transferable e-cash
1474,10.1109/CSF.2015.11,Policy privacy in cryptographic access control
1643,10.1007/978-3-319-10879-7_7,Constrained Verifiable Random Functions 
1927,10.1145/2591796.2591825,Adaptive security of constrained PRFs
2045,10.1007/978-3-642-54631-0_19,Enhanced chosen-ciphertext security and applications
2046,10.1007/978-3-642-54631-0_30,Policy-based signatures
2260,10.1007/978-3-642-38980-1_33,Efficient signatures of knowledge and DAA in the standard model
2291,10.1109/CSF.2013.15,Cryptographically enforced RBAC
502,10.3233/JCS-130477,Short blind signatures
