Optimal Security Proofs for Signatures from Identification Schemes

From MaRDI portal
Revision as of 19:47, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2829210

DOI10.1007/978-3-662-53008-5_2zbMath1391.94768OpenAlexW2492190064WikidataQ60220895 ScholiaQ60220895MaRDI QIDQ2829210

Jia-xin Pan, Eike Kiltz, Daniel Masny

Publication date: 27 October 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_2




Related Items (30)

Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsDualRing: generic construction of ring signatures with efficient instantiationsGeneric construction for tightly-secure signatures from discrete logSigned Diffie-Hellman key exchange with tight securityThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesOptimal tightness for chain-based unique signaturesOn the multi-user security of short Schnorr signatures with preprocessingKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeChain Reductions for Multi-signatures and the HBMS SchemeMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSAFrom Identification to Signatures, Tightly: A Framework and Generic TransformsChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsOn tight security proofs for Schnorr signaturesLattice-based signatures with tight adaptive corruptions and moreAttribute-based anonymous credential: optimization for single-use and multi-useMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemIdentification scheme and forward-secure signature in identity-based setting from isogeniesEPG-representations with Small Grid-SizeSecurity of BLS and BGLS signatures in a multi-user settingSecurity of hedged Fiat-Shamir signatures under fault attacksImpossibility on tamper-resilient cryptography with uniqueness propertiesTwo-party adaptor signatures from identification schemesMore efficient digital signatures with tight multi-user securityOptimal Security Proofs for Signatures from Identification SchemesThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Simple Schnorr multi-signatures with applications to bitcoinSigned (group) Diffie-Hellman key exchange with tight securityBetter concrete security for half-gates garbling (in the multi-instance setting)Efficient and tight oblivious transfer from PKE with tight multi-user security



Cites Work


This page was built for publication: Optimal Security Proofs for Signatures from Identification Schemes