Short and Stateless Signatures from the RSA Assumption
From MaRDI portal
Publication:3183590
DOI10.1007/978-3-642-03356-8_38zbMath1252.94074OpenAlexW1893433466MaRDI QIDQ3183590
Susan Hohenberger, Brent Waters
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_38
Related Items
New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications ⋮ Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes ⋮ Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper) ⋮ Tightly secure signatures from lossy identification schemes ⋮ A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption ⋮ Memory lower bounds of reductions revisited ⋮ Fully leakage-resilient signatures ⋮ Efficient chameleon hash functions in the enhanced collision resistant model ⋮ Short signatures from Diffie-Hellman: realizing almost compact public key ⋮ Bonsai trees, or how to delegate a lattice basis ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ The power of undirected rewindings for adaptive security ⋮ Programmable hash functions and their applications ⋮ On the impossibility of purely algebraic signatures ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ On the tightness of forward-secure signature reductions ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ New methods and abstractions for RSA-based forward secure signatures ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Vector Commitments and Their Applications ⋮ Tighter Reductions for Forward-Secure Signature Schemes ⋮ Efficient digital signatures from RSA without random oracles ⋮ Chameleon-Hashes with Ephemeral Trapdoors ⋮ Removing the Strong RSA Assumption from Arguments over the Integers ⋮ A Framework for Constructing Convertible Undeniable Signatures ⋮ Confined guessing: new signatures from standard assumptions ⋮ Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography ⋮ Realizing Hash-and-Sign Signatures under Standard Assumptions ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Two-Message, Oblivious Evaluation of Cryptographic Functionalities ⋮ A Storage Efficient Redactable Signature in the Standard Model ⋮ Obfuscation of Hyperplane Membership ⋮ Practical (fully) distributed signatures provably secure in the standard model
This page was built for publication: Short and Stateless Signatures from the RSA Assumption