Post-quantum key-blinding for authentication in anonymity networks
From MaRDI portal
Publication:2146075
DOI10.1007/978-3-030-88238-9_4zbMath1497.81041OpenAlexW3197610636MaRDI QIDQ2146075
Edward Eaton, Roy Stracovsky, Douglas Stebila
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88238-9_4
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Elliptic curves (14H52) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Tightly secure signatures from lossy identification schemes
- Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings.
- A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
- CSIDH: an efficient post-quantum commutative group action
- Banquet: short and fast signatures from AES
- Lattice-based blind signatures, revisited
- He gives C-sieves on the CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage
- High-Speed High-Security Signatures
- LegRoast: Efficient Post-quantum Signatures from the Legendre PRF
- A Practical Multivariate Blind Signature Scheme
This page was built for publication: Post-quantum key-blinding for authentication in anonymity networks