A generic construction of tightly secure signatures in the multi-user setting
From MaRDI portal
Publication:2419110
DOI10.1016/j.tcs.2018.12.012zbMath1455.94221OpenAlexW2904090960WikidataQ128774069 ScholiaQ128774069MaRDI QIDQ2419110
Joseph K. Liu, Xiao Zhang, Shengli Liu, Da-Wu Gu
Publication date: 29 May 2019
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.12.012
Related Items (3)
Generic construction for tightly-secure signatures from discrete log ⋮ Tight security for the generic construction of identity-based signature (in the multi-instance setting) ⋮ Short identity-based signatures with tight security from lattices
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tightly secure signatures and public-key encryption
- Security proofs for identity-based identification and signature schemes
- Public key signatures in the multi-user setting.
- On-line/off-line digital signatures
- Tightly-secure signatures from the decisional composite residuosity assumption
- Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography
- Identity-Based Cryptosystems and Quadratic Residuosity
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Tightly Secure Signatures and Public-Key Encryption
- Tightly-Secure Signatures from Chameleon Hash Functions
- Identity-Based Cryptosystems and Signature Schemes
- Short Signatures from Weaker Assumptions
- New Generation of Secure and Practical RSA-Based Signatures
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Structure-Preserving Signatures and Commitments to Group Elements
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Hierarchical ID-Based Cryptography
- Strong Key-Insulated Signature Schemes
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Adaptive Partitioning
- Efficient Identity-Based Encryption Without Random Oracles
- Public Key Cryptography - PKC 2005
- Efficient Identity-Based Signatures Secure in the Standard Model
This page was built for publication: A generic construction of tightly secure signatures in the multi-user setting