Security arguments for digital signatures and blind signatures

From MaRDI portal
Revision as of 01:23, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1573771

DOI10.1007/S001450010003zbMath1025.94015DBLPjournals/joc/PointchevalS00OpenAlexW2169194339WikidataQ56921502 ScholiaQ56921502MaRDI QIDQ1573771

David Pointcheval, Jacques Stern

Publication date: 8 August 2000

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001450010003




Related Items (only showing first 100 items - show all)

Another Look at TightnessGroup Signatures with Decentralized TracingOn the Joint Security of Encryption and Signature in EMVSecurity properties of one “short” signature schemeA new ID-based proxy multi-signature scheme from bilinear pairingsAttribute-based versions of Schnorr and ElGamalAdaptively Secure Strong Designated SignaturePractical Round-Optimal Blind Signatures in the Standard ModelEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesCertificateless Proxy Re-Encryption Without PairingsLinkable Message Tagging: Solving the Key Distribution Problem of Signature SchemesPrivate Certificate-Based Remote Data Integrity Checking in Public CloudsSimple-Yet-Efficient Construction and Revocation of Group SignaturesBoosting the Security of Blind Signature SchemesChain Reductions for Multi-signatures and the HBMS SchemeOn the (im)possibility of secure ElGamal blind signaturesMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSASecurity analysis of RSA-BSSAFrom Identification to Signatures, Tightly: A Framework and Generic TransformsThe return of the SDitHNon-interactive blind signatures for random messagesRai-Choo! Evolving blind signatures to the next levelTwo Notes on the Security of Certificateless SignaturesComplex Zero-Knowledge Proofs of Knowledge Are Easy to UseA random oracle for all of usA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingSETLA: Signature and Encryption from LatticesDesignated-verifier linkable ring signatures with unconditional anonymityPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreOn pairing-free blind signature schemes in the algebraic group modelSimulation-sound arguments for LWE and applications to KDM-CCA2 securityPractical dynamic group signatures without knowledge extractorsAccountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in CloudAcyclicity programming for sigma-protocolsLinearly homomorphic signatures with designated combinerCode-based signatures from new proofs of knowledge for the syndrome decoding problemShared permutation for syndrome decoding: new zero-knowledge protocol and code-based signatureSigncryption schemes with threshold unsigncryption, and applicationsAn efficient certificateless proxy signature scheme without pairingA provably secure short signature scheme based on discrete logarithmsResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksA NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEA Signature Scheme with Efficient Proof of ValidityIdentity-based ring signatures from RSAA pairing-free certificateless digital multisignature scheme using elliptic curve cryptographyRemoving the Strong RSA Assumption from Arguments over the IntegersA New Dynamic Code-Based Group Signature SchemeEnhancing the security of perfect blind DL-signaturesAn Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s ReputationFully Secure Threshold UnsigncryptionGroup signatures and more from isogenies and lattices: generic, simple, and efficientSecurity of the design of time-stamped signaturesImproved Bounds on Security Reductions for Discrete Log Based SignaturesECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageAn Efficient ID-Based Proxy Signature Scheme from PairingsUnlinkable Randomizable Signature and Its Application in Group SignatureOne-Round ID-Based Blind Signature Scheme without ROS AssumptionAnother look at HMQVConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesSecurity of Digital Signature Schemes in Weakened Random Oracle ModelsEquivocal Blind Signatures and Adaptive UC-SecurityVerifier-Key-Flexible Universal Designated-Verifier SignaturesMulti-theorem preprocessing NIZKs from latticesExtended security arguments for signature schemesCryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairingThe electronic cash system based on non-interactive zero-knowledge proofsA Generic Construction for Universally-Convertible Undeniable SignaturesEfficient ID-Based Digital Signatures with Message RecoveryStrongly Secure Certificateless Public Key Encryption Without PairingDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysSeparation Results on the “One-More” Computational ProblemsOn the (in)security of ROSTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesOn the (in)security of ROSOn the Portability of Generalized Schnorr ProofsUnconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to CommitmentHash function requirements for Schnorr signaturesMinicrypt primitives with algebraic structure and applicationsA Schnorr-Like Lightweight Identity-Based Signature SchemeAnonymity from Public Key Encryption to Undeniable SignaturesTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionFiat–Shamir for Highly Sound Protocols Is InstantiablePractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsSecurity of blind signatures under aborts and applications to adaptive oblivious transferOptimal Security Proofs for Signatures from Identification SchemesTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesStrong Forward Security in Identity-Based SigncryptionOn the Rabin SignatureComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionA new key authentication scheme for cryptosystems based on discrete logarithmsIdentity based designated multi-confirmer signature: a new type signatureGeneric groups, collision resistance, and ECDSADigital SignaturesEfficient Round-Optimal Blind Signatures in the Standard ModelProvably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptographyForty years of attacks on the RSA cryptosystem: A brief surveyPractical algorithm substitution attack on extractable signatures


Uses Software






This page was built for publication: Security arguments for digital signatures and blind signatures