scientific article; zbMATH DE number 2086722

From MaRDI portal
Publication:4737261

zbMath1056.94519MaRDI QIDQ4737261

Michel Abdalla, Chanathip Namprempre, Mihir Bellare, Jee Hea An

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320418.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (33)

Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsLESS is More: Code-Based Signatures Without SyndromesFiat-Shamir for highly sound protocols is instantiableTightly secure signatures from lossy identification schemesFine-grained forward secrecy: allow-list/deny-list encryption and applicationsAn isogeny-based ID protocol using structured public keysFiat-Shamir and correlation intractability from strong KDM-secure encryptionRandom oracles and non-uniformityHardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSAFrom Identification to Signatures, Tightly: A Framework and Generic TransformsProvably unforgeable threshold EdDSA with an offline participant and trustless setupSyndrome decoding in the head: shorter signatures from zero-knowledge proofsA universally composable non-interactive aggregate cash systemAnamorphic signatures: secrecy from a dictator who only permits authentication!MR-DSS -- smaller MinRank-based (ring-)signaturesIdentification scheme and forward-secure signature in identity-based setting from isogeniesShared permutation for syndrome decoding: new zero-knowledge protocol and code-based signatureOn the tightness of forward-secure signature reductionsLossy Identification Schemes from Decisional RSATighter Reductions for Forward-Secure Signature SchemesDeterring Certificate Subversion: Efficient Double-Authentication-Preventing SignaturesMasking the GLP lattice-based signature scheme at any orderA novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomialsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesExtended security arguments for signature schemesIdentification protocols and signature schemes based on supersingular isogeny problemsSecurity of hedged Fiat-Shamir signatures under fault attacksSignatures from sequential-OR proofsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Fiat–Shamir for Highly Sound Protocols Is InstantiableSecurity proofs for identity-based identification and signature schemesOptimal Security Proofs for Signatures from Identification SchemesLattice-based blind signatures, revisited




This page was built for publication: