Tightly-Secure Signatures from Lossy Identification Schemes

From MaRDI portal
Publication:2894432

DOI10.1007/978-3-642-29011-4_34zbMath1297.94115OpenAlexW1582357539MaRDI QIDQ2894432

Pierre-Alain Fouque, Mehdi Tibouchi, Michel Abdalla, Vadim Lyubashevsky

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_34




Related Items (28)

On the security loss of unique signaturesTightly secure signatures from lossy identification schemesLogarithmic-size ring signatures with tight security from the DDH assumptionOptimal tightness for chain-based unique signaturesOn tightly-secure (linkable) ring signaturesDigital Signatures with Memory-Tight Security in the Multi-challenge SettingFrom Identification to Signatures, Tightly: A Framework and Generic TransformsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsA lightweight identification protocol based on latticesEntanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based SignaturesFiat-Shamir signatures based on module-NTRULattice-based signatures with tight adaptive corruptions and moreOn rejection sampling in Lyubashevsky's signature schemeTight adaptive reprogramming in the QROMPractical dynamic group signatures without knowledge extractorsOn the tightness of forward-secure signature reductionsLossy Identification Schemes from Decisional RSATighter Reductions for Forward-Secure Signature SchemesCompact structure-preserving signatures with almost tight securityNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512More efficient digital signatures with tight multi-user securityVerifiable random functions with optimal tightnessOptimal Security Proofs for Signatures from Identification SchemesIdentity-based signatures in standard modelTightly secure signature schemes from the LWE and subset sum assumptionsShort identity-based signatures with tight security from lattices




This page was built for publication: Tightly-Secure Signatures from Lossy Identification Schemes