Identity-based signatures in standard model
From MaRDI portal
Publication:2317833
DOI10.1007/S00236-018-0322-0zbMATH Open1425.94052OpenAlexW2800676997MaRDI QIDQ2317833FDOQ2317833
Authors: Chenchen Zhang, Hui-Yan Chen
Publication date: 13 August 2019
Published in: Acta Informatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00236-018-0322-0
Recommendations
- Efficient Identity-Based Signatures Secure in the Standard Model
- scientific article; zbMATH DE number 5669795
- Strongly unforgeable ID-based signatures without random oracles
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Security arguments for digital signatures and blind signatures
- Short signatures from the Weil pairing
- Short signatures without random oracles and the SDH assumption in bilinear groups
- The exact security of digital signatures -- how to sign with RSA and Rabin
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Cryptography – PKC 2004
- On the exact security of Schnorr-type signatures in the random oracle model
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- Advances in Cryptology - EUROCRYPT 2004
- Efficient signature schemes with tight reductions to the Diffie-Hellman problems
- Tight proofs for signature schemes without random oracles
- Title not available (Why is that?)
- A Practical and Tightly Secure Signature Scheme Without Hash Function
- Proving Tight Security for Rabin-Williams Signatures
- Public Key Cryptography – PKC 2004
- Improving the exact security of digital signature schemes
- Tightly-secure signatures from lossy identification schemes
- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient ID-Based Digital Signatures with Message Recovery
- Efficient Identity-Based Signatures Secure in the Standard Model
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- A novel ID-based designated verifier signature scheme
- Financial Cryptography and Data Security
- On tight security proofs for Schnorr signatures
- Improved Bounds on Security Reductions for Discrete Log Based Signatures
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- Tight security for signature schemes without random oracles
Cited In (10)
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Efficient Identity-Based Signatures Secure in the Standard Model
- Short identity-based signatures with tight security from lattices
- An efficient identity-based signature scheme with provable security
- New Construction of Short Hierarchical ID-Based Signature in the Standard Model
- A tightly secure ID-based signature scheme under DL assumption in AGM
- Toward tight security of the Galindo-Garcia identity-based signature
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- Strongly unforgeable ID-based signatures without random oracles
This page was built for publication: Identity-based signatures in standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2317833)