Security of 2t-Root Identification and Signatures
From MaRDI portal
Publication:3452348
DOI10.1007/3-540-68697-5_12zbMath1329.94077OpenAlexW1788217089MaRDI QIDQ3452348
Publication date: 11 November 2015
Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68697-5_12
identificationsignaturerandom oracle modelFiat-Shamir schemeactive/passive impersonation attacksadaptive chosen-message attackfactoring of integers
Related Items (2)
Security proofs for identity-based identification and signature schemes ⋮ Improving the exact security of digital signature schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Zero-knowledge proofs of identity
- Efficient signature generation by smart cards
- On the Security of a Practical Identification Scheme
- Security Proofs for Signature Schemes
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- The Knowledge Complexity of Interactive Proof Systems
This page was built for publication: Security of 2t-Root Identification and Signatures