Post-quantum EPID signatures from symmetric primitives
From MaRDI portal
Publication:2290455
Recommendations
- Post-quantum ID-based ring signatures from symmetric-key primitives
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms
- scientific article; zbMATH DE number 7259165
- Post-quantum cryptography: lattice signatures
- Post-quantum cryptography: Code-based signatures
- A note on the post-quantum security of (ring) signatures
- The postprocessing of quantum digital signatures
- LegRoast: efficient post-quantum signatures from the Legendre PRF
- Post-quantum signature algorithms based on the hidden discrete logarithm problem
- SQISign: compact post-quantum signatures from quaternions and isogenies
Cited in
(14)- EPID with malicious revocation
- Lattice signature with efficient protocols, application to anonymous credentials
- Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives
- Post-quantum verifiable random function from symmetric primitives in PoS blockchain
- Surnaming schemes, fast verification, and applications to SGX technology
- Witness authenticating NIZKs and applications
- Related-key differential cryptanalysis of GMiMC used in post-quantum signatures
- Post-quantum ID-based ring signatures from symmetric-key primitives
- Subversion-resilient enhanced privacy ID
- Traceable ring signatures: general framework and post-quantum security
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function
- Hash-Based Direct Anonymous Attestation
- Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
This page was built for publication: Post-quantum EPID signatures from symmetric primitives
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2290455)