Efficient signature schemes with tight reductions to the Diffie-Hellman problems

From MaRDI portal
Revision as of 00:31, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2463446

DOI10.1007/S00145-007-0549-3zbMath1132.68027OpenAlexW2012986054MaRDI QIDQ2463446

Stanislaw Jarecki, Eu-Jin Goh, Nan Wang, Jonathan N. Katz

Publication date: 6 December 2007

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-007-0549-3






Related Items (26)

Tightly secure signatures from lossy identification schemesDecaf: Eliminating Cofactors Through Point CompressionA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionShort signatures from Diffie-Hellman: realizing almost compact public keyKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsHow to sample a discrete Gaussian (and more) from a random oraclePractical dynamic group signatures without knowledge extractorsTight security for the generic construction of identity-based signature (in the multi-instance setting)New technique for chosen-ciphertext security based on non-interactive zero-knowledgeLossy Identification Schemes from Decisional RSAOptimal security proofs for full domain hash. RevisitedZero-knowledge argument for simultaneous discrete logarithmsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyA tightly secure ID-based signature scheme under DL assumption in AGMA non-interactive deniable authentication scheme based on designated verifier proofsTwinkle: threshold signatures from DDH with full adaptive securityToothpicks: more efficient fork-free two-round multi-signaturesRealizing Hash-and-Sign Signatures under Standard AssumptionsMultisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key ModelIdentity-Based Deterministic Signature Scheme without Forking-LemmaOptimal Security Proofs for Signatures from Identification SchemesIdentity-based signatures in standard modelShort tightly secure signatures for signing a vector of group elements: a new approachShort identity-based signatures with tight security from lattices







This page was built for publication: Efficient signature schemes with tight reductions to the Diffie-Hellman problems