Security Proofs for Signature Schemes

From MaRDI portal
Publication:2876917

DOI10.1007/3-540-68339-9_33zbMath1304.94106OpenAlexW2166462813WikidataQ56921570 ScholiaQ56921570MaRDI QIDQ2876917

Jacques Stern, David Pointcheval

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_33




Related Items (only showing first 100 items - show all)

Fiat-Shamir transformation of multi-round interactive proofsTwo-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functionsPublicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-head\textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulationPractical algorithm substitution attack on extractable signaturesThreshold Schnorr with stateless deterministic signing from standard assumptions\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitmentsGeneric construction for tightly-secure signatures from discrete logSoK: how (not) to design and implement post-quantum cryptographyNon-interactive half-aggregation of EdDSA and variants of Schnorr signaturesOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessIdentity-based undetachable digital signature for mobile agents in electronic commerceA closer look at multiple forking: leveraging (in)dependence for a tighter boundLimits on the usefulness of random oraclesA signature scheme with non-repudiationHidden Collisions on DSSSecurity of 2t-Root Identification and SignaturesAn Efficient Privacy-Preserving E-coupon SystemFast generators for the Diffie-Hellman key agreement protocol and malicious standardsInteractive Oracle ProofsCertificateless signature: a new security model and an improved generic constructionProvable security of digital signatures in the tamper-proof device modelIdentity-based signature scheme based on quadratic residuesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionAn efficient multi-receipt mechanism for uncoercible anonymous electronic votingIdentity based signature scheme based on cubic residuesCertificate-based signcryption with enhanced security featuresEfficient arbitrated quantum signature and its proof of securityReusing nonces in Schnorr signatures (and keeping it secure...)Logarithmic-size ring signatures with tight security from the DDH assumptionImproved signature schemes for secure multi-party computation with certified inputsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeSNARGs for P from sub-exponential DDH and QROn the multi-user security of short Schnorr signatures with preprocessingCertificateless aggregate signature scheme secure against fully chosen-key attacksA multivariate based threshold ring signature schemeSuccinct arguments in the quantum random oracle modelOn the (In)security of Kilian-based SNARGsThe random oracle model: a twenty-year retrospectiveOn tightly-secure (linkable) ring signaturesPromise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class GroupsThe One-More Discrete Logarithm Assumption in the Generic Group ModelCompact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problemsFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesOn tight security proofs for Schnorr signaturesAn Efficient Strong Key-Insulated Signature Scheme and Its ApplicationImproved straight-line extraction in the random oracle model with applications to signature aggregationFiat-Shamir transformation of multi-round interactive proofs (Extended version)A pairing-free and provably secure certificateless signature schemeThe power of undirected rewindings for adaptive securityAnamorphic signatures: secrecy from a dictator who only permits authentication!\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistA public key cryptosystem based on three new provable problemsIdentity-based signature and extended forking algorithm in the multivariate quadratic settingTernary forking lemma and its application to the analysis of one code-based signatureA round-optimal three-party ID-based authenticated key agreement protocolALBATROSS: publicly AttestabLe BATched Randomness based On Secret SharingA Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksStrongly secure certificateless signature scheme supporting batch verificationProvably secure certificate-based signature scheme without pairingsA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryProvably secure and efficient proxy signature with untrustworthy proxy signerSubliminal Hash ChannelsA provably secure short signature scheme based on discrete logarithmsTightly secure ring signatures in the standard modelAuthenticated Key Agreement Protocol Based on Provable Secure Cryptographic FunctionsNew designing of cryptosystems based on quadratic fieldsContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingRemoving the Strong RSA Assumption from Arguments over the IntegersSelf-generated-certificate public key encryption without pairing and its applicationEnhancing the security of perfect blind DL-signaturesA fair and efficient solution to the socialist millionaires' problemLower bounds for non-black-box zero knowledgeA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Proxy blind multi-signature scheme without a secure channelImproved Bounds on Security Reductions for Discrete Log Based SignaturesMulti-theorem preprocessing NIZKs from latticesImproved OR-Composition of Sigma-ProtocolsExtended security arguments for signature schemes\(k\)-critical graphs in \(P_5\)-free graphsRealizing Hash-and-Sign Signatures under Standard AssumptionsClassical vs quantum random oraclesPublic-coin statistical zero-knowledge batch verification against malicious verifiersEfficient range proofs with transparent setup from bounded integer commitmentsA paid message forwarding scheme based on social networkFuzzy Signatures: Relaxing Requirements and a New ConstructionTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueIdentity-Based Deterministic Signature Scheme without Forking-LemmaEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsIndifferentiability of 8-Round Feistel NetworksOn the security of a convertible authenticated encryptionDesignated verifier proxy signature scheme with message recoveryDigital SignaturesLattice-based blind signatures, revisitedA gapless code-based hash proof system based on RQC and its applicationsImproving the exact security of digital signature schemesFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFsDesignated-verifier linkable ring signaturesAn efficient certificateless undeniable signature scheme




This page was built for publication: Security Proofs for Signature Schemes