The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme

From MaRDI portal
Publication:1402372

DOI10.1007/s00145-002-0120-1zbMath1045.94012OpenAlexW2054482077WikidataQ56921345 ScholiaQ56921345MaRDI QIDQ1402372

Mihir Bellare, M. Semanko, Chanathip Namprempre, David Pointcheval

Publication date: 27 August 2003

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-002-0120-1




Related Items (58)

Two-round trip Schnorr multi-signatures via delinearized witnessesMuSig2: simple two-round Schnorr multi-signaturesToward RSA-OAEP Without Random OraclesBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesStructure-preserving signatures and commitments to group elementsA new universal designated verifier transitive signature scheme for big graph dataPractical Round-Optimal Blind Signatures in the Standard ModelThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsSecurity of blind signatures revisitedOn the multi-user security of short Schnorr signatures with preprocessingA fast and simple partially oblivious PRF, with applicationsShort pairing-free blind signatures with exponential securityProvably secure randomized blind signature scheme based on bilinear pairingThe One-More Discrete Logarithm Assumption in the Generic Group ModelChain Reductions for Multi-signatures and the HBMS SchemeSecurity analysis of RSA-BSSAThreshold and multi-signature schemes from linear hash functionsRai-Choo! Evolving blind signatures to the next levelPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreOn tight security proofs for Schnorr signaturesOn pairing-free blind signature schemes in the algebraic group modelBetter than advertised security for non-interactive threshold signatures\textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generationFully adaptive Schnorr threshold signaturesSnowblind: a threshold blind signature in pairing-free groupsPractical Schnorr threshold signatures without the algebraic group modelOblivious pseudorandom functions from isogeniesMulti-recastable e-bidding game with dual-blindnessUser efficient recoverable off-line e-cash scheme with fast anonymity revokingA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortWhen e-th Roots Become Easier Than FactoringPrivacy protection in on-line shopping for electronic documentsA code-based group signature schemeOptimal security proofs for full domain hash. RevisitedHomomorphic Encryption and Signatures from Vector DecompositionPrivate set-intersection with common set-upEquivocal Blind Signatures and Adaptive UC-SecurityMulti-theorem preprocessing NIZKs from latticesAnother look at non-standard discrete log and Diffie-Hellman problemsSecure Data Deduplication with Reliable Data Deletion in CloudTransitive Signatures from Braid GroupsSeparation Results on the “One-More” Computational ProblemsDivisible On-Line/Off-Line SignaturesUnconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to CommitmentOn selective-opening security of deterministic primitivesVirtual Smart Cards: How to Sign with a Password and a ServerPractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsSecurity proofs for identity-based identification and signature schemesOptimal Security Proofs for Signatures from Identification SchemesOblivious keyword searchSimple Schnorr multi-signatures with applications to bitcoinEfficient Round-Optimal Blind Signatures in the Standard ModelCryptographic Voting — A Gentle IntroductionAnonymous tokens with private metadata bitA provable secure pairing-free certificateless identification schemeNew approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groupsBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model




This page was built for publication: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme