Pages that link to "Item:Q2829210"
From MaRDI portal
The following pages link to Optimal Security Proofs for Signatures from Identification Schemes (Q2829210):
Displaying 24 items.
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- Signed Diffie-Hellman key exchange with tight security (Q826255) (← links)
- Security of hedged Fiat-Shamir signatures under fault attacks (Q2055633) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Two-party adaptor signatures from identification schemes (Q2061930) (← links)
- More efficient digital signatures with tight multi-user security (Q2061945) (← links)
- Signed (group) Diffie-Hellman key exchange with tight security (Q2082164) (← links)
- Better concrete security for half-gates garbling (in the multi-instance setting) (Q2096549) (← links)
- Efficient and tight oblivious transfer from PKE with tight multi-user security (Q2096634) (← links)
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols (Q2120075) (← links)
- DualRing: generic construction of ring signatures with efficient instantiations (Q2120078) (← links)
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures (Q2152049) (← links)
- Optimal tightness for chain-based unique signatures (Q2170062) (← links)
- On the multi-user security of short Schnorr signatures with preprocessing (Q2170064) (← links)
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- On tight security proofs for Schnorr signatures (Q2423848) (← links)
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system (Q2691596) (← links)
- Identification scheme and forward-secure signature in identity-based setting from isogenies (Q2697929) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- From Identification to Signatures, Tightly: A Framework and Generic Transforms (Q2953785) (← links)
- EPG-representations with Small Grid-Size (Q4625111) (← links)