On the security loss of unique signatures (Q1629431): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-03807-6_19 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2889529480 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-Secure Signatures from Lossy Identification Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating Short Structure-Preserving Signatures from Non-interactive Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Tight Cryptographic Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Notions of Black-Box Reductions, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Hardness of Proving CCA-Security of Signed ElGamal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving Tight Security for Rabin-Williams Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking RSA may not be equivalent to factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weak Verifiable Random Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separation Results on the “One-More” Computational Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly Secure IBE Under Constant-Size Master Public Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully, (Almost) Tightly Secure IBE and Dual System Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737250 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542559 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Three-Move Blind Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The knowledge complexity of interactive proof-systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly Secure Signatures and Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Waters Signatures with Optimal Security Reduction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Random Functions from Weaker Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Security Proofs for Full Domain Hash, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded-concurrent secure two-party computation without setup assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871218 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409145 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits of provable security from standard assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The sleepy model of consensus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concurrent zero knowledge, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Constant-Round Concurrent Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250778 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Memory lower bounds of reductions revisited / rank
 
Normal rank

Latest revision as of 15:17, 17 July 2024

scientific article
Language Label Description Also known as
English
On the security loss of unique signatures
scientific article

    Statements

    On the security loss of unique signatures (English)
    0 references
    0 references
    0 references
    11 December 2018
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers