Tight security for the generic construction of identity-based signature (in the multi-instance setting)
From MaRDI portal
Publication:2210521
DOI10.1016/J.TCS.2020.09.044zbMath1467.94044OpenAlexW3089773398WikidataQ115036475 ScholiaQ115036475MaRDI QIDQ2210521
Publication date: 6 November 2020
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2020.09.044
Related Items (3)
OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss ⋮ A Tightly Secure Identity-Based Signature Scheme from Isogenies ⋮ Short identity-based signatures with tight security from lattices
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Practical and tightly-secure digital signatures and authenticated key exchange
- A generic construction of tightly secure signatures in the multi-user setting
- Efficient signature schemes with tight reductions to the Diffie-Hellman problems
- Tightly Secure Signatures and Public-Key Encryption
- Tightly-Secure Signatures from Chameleon Hash Functions
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Identity-Based Cryptosystems and Signature Schemes
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Hierarchical ID-Based Cryptography
- Strong Key-Insulated Signature Schemes
- Tightly-Secure Authenticated Key Exchange
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction
- Automata, Languages and Programming
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Tight security for the generic construction of identity-based signature (in the multi-instance setting)