Tightly-secure signatures from five-move identification protocols
From MaRDI portal
Publication:1701435
DOI10.1007/978-3-319-70700-6_3zbMATH Open1417.94068OpenAlexW2771026522MaRDI QIDQ1701435FDOQ1701435
Authors: Eike Kiltz, Julian Loss, Jia-xin Pan
Publication date: 23 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70700-6_3
Recommendations
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Tightly-Secure Signatures from Chameleon Hash Functions
- Optimal security proofs for signatures from identification schemes
- scientific article; zbMATH DE number 2086722
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
Cited In (7)
- Generic construction for tightly-secure signatures from discrete log
- Hierarchical identity-based encryption with tight multi-challenge security
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- Optimal tightness for chain-based unique signatures
- Twinkle: threshold signatures from DDH with full adaptive security
- Pairing-free blind signatures from CDH assumptions
- Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding
This page was built for publication: Tightly-secure signatures from five-move identification protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1701435)