From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
From MaRDI portal
Publication:3604773
DOI10.1109/TIT.2008.926303zbMATH Open1329.94049OpenAlexW2116944704MaRDI QIDQ3604773FDOQ3604773
Authors: Michel Abdalla, Jee Hea An, M. Bellare, Chanathip Namprempre
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2008.926303
Recommendations
- scientific article; zbMATH DE number 2086722
- From identification using rejection sampling to signatures via the Fiat-Shamir transform: application to the BLISS signature
- Forward-secure identity-based signature: security notions and construction
- scientific article; zbMATH DE number 708798
- Forward security of Fiat-Shamir lattice signatures
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- Optimal security proofs for signatures from identification schemes
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- scientific article; zbMATH DE number 1489843
- scientific article; zbMATH DE number 1842500
Cited In (12)
- Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
- Formal Security Treatments for Signatures from Identity-Based Encryption
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Title not available (Why is that?)
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- The Fiat-Shamir transform for group and ring signature schemes
- DualRing: generic construction of ring signatures with efficient instantiations
- Extended security arguments for signature schemes
- On the insecurity of the Fiat-Shamir signatures with iterative hash functions
- Title not available (Why is that?)
- On the tightness of forward-secure signature reductions
This page was built for publication: From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604773)