Tagged One-Time Signatures: Tight Security and Optimal Tag Size

From MaRDI portal
Revision as of 06:38, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4916017

DOI10.1007/978-3-642-36362-7_20zbMath1314.94099OpenAlexW125097325MaRDI QIDQ4916017

Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo, Masayuki Abe

Publication date: 19 April 2013

Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)

Full work available at URL: https://www.pure.ed.ac.uk/ws/files/55343338/Tagged_One_Time_Signatures.pdf





Related Items (29)

Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessStructure-preserving signatures and commitments to group elementsTightly secure signatures and public-key encryptionStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsConstant-size structure-preserving signatures: generic constructions and simple assumptionsIssuer-hiding attribute-based credentialsMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsLinearly homomorphic structure-preserving signatures and their applicationsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeStructure-Preserving Smooth Projective HashingTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesFine-grained verifier NIZK and its applicationsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsOn the tightness of forward-secure signature reductionsGeneralized public-key cryptography with tight securityTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTightly secure ring signatures in the standard modelImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyBringing order to chaos: the case of collision-resistant chameleon-hashesDesign in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer ProgrammingShort tightly secure signatures for signing a vector of group elements: a new approachAdaptive PartitioningPartially structure-preserving signatures: lower bounds, constructions and more




Cites Work




This page was built for publication: Tagged One-Time Signatures: Tight Security and Optimal Tag Size