On the tightness of forward-secure signature reductions (Q1715854): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q56920926, #quickstatements; #temporary_batch_1709738850358
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-018-9283-2 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-018-9283-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2951074086 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737261 / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tighter Reductions for Forward-Secure Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tagged One-Time Signatures: Tight Security and Optimal Tag Size / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-Secure Signatures from Lossy Identification Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly secure signatures from lossy identification schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient cryptosystems from \(2^k\)-th power residue symbols / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Tight Cryptographic Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941872 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unrestricted Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Identification to Signatures, Tightly: A Framework and Generic Transforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4888749 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343443 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fine-grained forward-secure signature schemes without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250776 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737250 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4394211 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero-knowledge proofs of identity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364540 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Bounds on Security Reductions for Discrete Log Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: A “Paradoxical” Solution to The Signature Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Knowledge Complexity of Interactive Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strengthening zero-knowledge protocols using signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3775469 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly Secure Signatures and Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short and Stateless Signatures from the RSA Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient cryptographic schemes provably as secure as subset sum / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783734 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Cryptosystems from 2 k -th Power Residue Symbols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Security Proofs for Full Domain Hash, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instantiability of RSA-OAEP under Chosen-Plaintext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized Compact Knapsacks Are Collision Resistant / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737260 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the exact security of digital signature schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of signature schemes in a multi-user setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3197311 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036898 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249340 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security arguments for digital signatures and blind signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Diffie-Hellman Key Agreement with Short Exponents / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-018-9283-2 / rank
 
Normal rank

Latest revision as of 05:48, 11 December 2024

scientific article
Language Label Description Also known as
English
On the tightness of forward-secure signature reductions
scientific article

    Statements

    On the tightness of forward-secure signature reductions (English)
    0 references
    0 references
    0 references
    0 references
    29 January 2019
    0 references
    forward security
    0 references
    digital signatures
    0 references
    reduction tightness
    0 references
    lossy identification
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers