Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures

From MaRDI portal
Publication:3650716

DOI10.1007/978-3-642-10366-7_35zbMath1267.94125OpenAlexW1506156414WikidataQ60362698 ScholiaQ60362698MaRDI QIDQ3650716

Vadim Lyubashevsky

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_35




Related Items (only showing first 100 items - show all)

DualRing: generic construction of ring signatures with efficient instantiationsLattice-based proof of shuffle and applications to electronic votingSoK: how (not) to design and implement post-quantum cryptographyIsochronous Gaussian Sampling: From Inception to ImplementationA compressed \(\varSigma \)-protocol theory for latticesA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsSMILE: set membership from ideal lattices with applications to ring signatures and confidential transactionsLattice-based zero-knowledge arguments for additive and multiplicative relationsEfficient lattice-based polynomial evaluation and batch ZK argumentsLWE without modular reduction and improved side-channel attacks against BLISSDoes Fiat-Shamir require a cryptographic hash function?Policy-based signature scheme from latticesTightly secure signatures from lossy identification schemesPractical post-quantum few-time verifiable random function with applications to AlgorandCryptanalysis of the rank preserving signatureBlindOR: an efficient lattice-based blind signature scheme from OR-proofsShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeNaor-Yung paradigm with shared randomness and applicationsPractical non-interactive publicly verifiable secret sharing with thousands of partiesSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyMultitarget Decryption Failure Attacks and Their Application to Saber and KyberEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsAsymptotically efficient lattice-based digital signaturesShorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other OptimizationsEfficient lattice-based traceable ring signature scheme with its application in blockchainLattice-based accumulator with constant time list update and constant time verificationImproved power analysis attacks on FalconProving knowledge of isogenies: a surveyDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsFrom Identification to Signatures, Tightly: A Framework and Generic TransformsA generic transform from multi-round interactive proof to NIZKA signature scheme from the finite field isomorphism problemA lightweight identification protocol based on latticesLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalShorter hash-and-sign lattice-based signaturesA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingSETLA: Signature and Encryption from LatticesFiat-Shamir signatures based on module-NTRUVerifiable decryption in the headRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsVerifiable Decryption for Fully Homomorphic EncryptionZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionOn rejection sampling in Lyubashevsky's signature schemeBLOOM: bimodal lattice one-out-of-many proofs and applicationsIdentity-based interactive aggregate signatures from latticesAnalysis of (U,U+V)-code problem with Gramian over binary and ternary fieldsPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerA framework for practical anonymous credentials from latticesTight adaptive reprogramming in the QROMDilithium for memory constrained devicesLattice-based inner product argumentMR-DSS -- smaller MinRank-based (ring-)signaturesPost-quantum asynchronous deniable key exchange and the signal handshakeZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?A code-based hybrid signcryption schemeLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesLattice-based cryptography: a surveyFast Falcon signature generation and verification using ARMv8 NEON instructionsA detailed analysis of Fiat-Shamir with abortsFixing and mechanizing the security proof of Fiat-Shamir with aborts and DilithiumEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsPractical exact proofs from lattices: new techniques to exploit fully-splitting ringsCryptographic group actions and applicationsCalamari and Falafl: logarithmic (linkable) ring signatures from isogenies and latticesIdentification scheme and forward-secure signature in identity-based setting from isogeniesShared permutation for syndrome decoding: new zero-knowledge protocol and code-based signatureSecret handshakes: full dynamicity, deniability and lattice-based designLossy Identification Schemes from Decisional RSAPublic key compression for constrained linear signature schemesThe lattice-based digital signature scheme qTESLAExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationOne-Shot Verifiable Encryption from LatticesAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackMasking the GLP lattice-based signature scheme at any orderEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesImproved Zero-Knowledge Identification with LatticesLearning strikes again: the case of the DRS signature scheme\(k\)-critical graphs in \(P_5\)-free graphsTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceModular lattice signatures, revisited(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesSigma protocols for MQ, PKP and SIS, and fishy signature schemesTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeThe Geometry of Lattice CryptographyShorter lattice-based zero-knowledge proofs via one-time commitmentsRound-optimal verifiable oblivious pseudorandom functions from ideal latticesHow to Prove Knowledge of Small SecretsLattice-based revocable certificateless signatureA non-PCP approach to succinct quantum-safe zero-knowledgePractical product proofs for lattice commitmentsLattice-based blind signatures, revisitedVerifying post-quantum signatures in 8 kB of RAMOn removing rejection conditions in practical lattice-based signatures\textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulation


Uses Software



This page was built for publication: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures