scientific article; zbMATH DE number 2086722
From MaRDI portal
Publication:4737261
zbMath1056.94519MaRDI QIDQ4737261
Michel Abdalla, Chanathip Namprempre, Mihir Bellare, Jee Hea An
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320418.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (33)
Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols ⋮ LESS is More: Code-Based Signatures Without Syndromes ⋮ Fiat-Shamir for highly sound protocols is instantiable ⋮ Tightly secure signatures from lossy identification schemes ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ An isogeny-based ID protocol using structured public keys ⋮ Fiat-Shamir and correlation intractability from strong KDM-secure encryption ⋮ Random oracles and non-uniformity ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ From Identification to Signatures, Tightly: A Framework and Generic Transforms ⋮ Provably unforgeable threshold EdDSA with an offline participant and trustless setup ⋮ Syndrome decoding in the head: shorter signatures from zero-knowledge proofs ⋮ A universally composable non-interactive aggregate cash system ⋮ Anamorphic signatures: secrecy from a dictator who only permits authentication! ⋮ MR-DSS -- smaller MinRank-based (ring-)signatures ⋮ Identification scheme and forward-secure signature in identity-based setting from isogenies ⋮ Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature ⋮ On the tightness of forward-secure signature reductions ⋮ Lossy Identification Schemes from Decisional RSA ⋮ Tighter Reductions for Forward-Secure Signature Schemes ⋮ Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures ⋮ Masking the GLP lattice-based signature scheme at any order ⋮ A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Extended security arguments for signature schemes ⋮ Identification protocols and signature schemes based on supersingular isogeny problems ⋮ Security of hedged Fiat-Shamir signatures under fault attacks ⋮ Signatures from sequential-OR proofs ⋮ Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512 ⋮ Fiat–Shamir for Highly Sound Protocols Is Instantiable ⋮ Security proofs for identity-based identification and signature schemes ⋮ Optimal Security Proofs for Signatures from Identification Schemes ⋮ Lattice-based blind signatures, revisited
This page was built for publication: