Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
From MaRDI portal
Publication:2055652
Recommendations
- SIDH proof of knowledge
- Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems
- Several cryptographic applications of \(\Sigma\)-protocol
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Post-quantum security of Fiat-Shamir
Cites work
- scientific article; zbMATH DE number 1618047 (Why is no real title available?)
- scientific article; zbMATH DE number 5485433 (Why is no real title available?)
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 708813 (Why is no real title available?)
- scientific article; zbMATH DE number 1024072 (Why is no real title available?)
- A Permutation Network
- A crossbred algorithm for solving Boolean polynomial systems
- A new identification scheme based on syndrome decoding
- Algebraic techniques for short(er) exact lattice-based zero-knowledge proofs
- Aurora: transparent succinct arguments for R1CS
- Classical proofs for the quantum collapsing property of classical hash functions
- Computationally binding quantum commitments
- Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography
- Fiat-Shamir with aborts: applications to lattice and factoring-based signatures
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Hybrid approach for solving multivariate systems over finite fields
- Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
- Lattice-based group signature scheme with verifier-local revocation
- Non-interactive zero-knowledge proofs in the quantum random oracle model
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Short discrete log proofs for FHE and ring-LWE ciphertexts
- Some remarks on the security of the identification scheme based on permuted kernels
- Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits
- The Knowledge Complexity of Interactive Proof Systems
- Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
Cited in
(35)- MR-DSS -- smaller MinRank-based (ring-)signatures
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- Several cryptographic applications of \(\Sigma\)-protocol
- Practical exact proofs from lattices: new techniques to exploit fully-splitting rings
- SIDH proof of knowledge
- Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge
- LESS-FM: fine-tuning signatures from the code equivalence problem
- Building MPCitH-based signatures from MQ, MinRank, and rank SD
- \textsf{FuLeeca}: a Lee-based signature scheme
- Efficient zero-knowledge arguments and digital signatures \textit{via} sharing conversion \textit{in the head}
- SoK: how (not) to design and implement post-quantum cryptography
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- On the number of solutions to a random instance of the permuted kernel problem
- Short signatures from regular syndrome decoding in the head
- An estimator for the hardness of the MQ problem
- Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection
- Banquet: short and fast signatures from AES
- Verifiable decryption in the head
- Correlated pseudorandomness from expand-accumulate codes
- Non-interactive composition of sigma-protocols via Share-then-Hash
- Advances in Cryptology - CRYPTO 2003
- Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs
- Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices
- Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems
- MAYO: practical post-quantum signatures from oil-and-vinegar maps
- On the (in)security of optimized Stern-like signature schemes
- Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
- Zero knowledge protocols and signatures from the restricted syndrome decoding problem
- More efficient amortization of exact zero-knowledge proofs for LWE
- One-time traceable ring signatures
- SOFIA: \(\mathcal{MQ}\)-based signatures in the QROM
- Sigma protocols from verifiable secret sharing and their applications
- PERK: compact signature scheme based on a new variant of the permuted kernel problem
This page was built for publication: Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2055652)