scientific article; zbMATH DE number 2086722
From MaRDI portal
Publication:4737261
zbMATH Open1056.94519MaRDI QIDQ4737261FDOQ4737261
Authors: Michel Abdalla, Jee Hea An, M. Bellare, Chanathip Namprempre
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320418.htm
Title of this publication is not available (Why is that?)
Recommendations
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Optimal security proofs for signatures from identification schemes
- The Fiat-Shamir transform for group and ring signature schemes
- scientific article; zbMATH DE number 1302859
Cited In (51)
- Identification protocols and signature schemes based on supersingular isogeny problems
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- Random oracles and non-uniformity
- A universally composable non-interactive aggregate cash system
- Fiat-Shamir security of FRI and related SNARKs
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \(\Sigma\)-protocols
- Rogue-instance security for batch knowledge proofs
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols
- Security proofs for identity-based identification and signature schemes
- Tightly-secure signatures from five-move identification protocols
- How to compile polynomial IOP into simulation-extractable SNARKs: a modular approach
- Optimal security proofs for signatures from identification schemes
- Security of hedged Fiat-Shamir signatures under fault attacks
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA
- Fiat-Shamir for highly sound protocols is instantiable
- Fiat-Shamir for highly sound protocols is instantiable
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Syndrome decoding in the head: shorter signatures from zero-knowledge proofs
- Tightly secure signatures from lossy identification schemes
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- An isogeny-based ID protocol using structured public keys
- The Fiat-Shamir transform for group and ring signature schemes
- MR-DSS -- smaller MinRank-based (ring-)signatures
- Masking the GLP lattice-based signature scheme at any order
- A second look at Fischlin's transformation
- Tighter Reductions for Forward-Secure Signature Schemes
- Signatures from sequential-OR proofs
- Cutting the GRASS: threshold group action signature schemes
- Lattice-based blind signatures, revisited
- Lossy identification schemes from decisional RSA
- Extended security arguments for signature schemes
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- From identification using rejection sampling to signatures via the Fiat-Shamir transform: application to the BLISS signature
- Extended security arguments for signature schemes
- Fiat-Shamir bulletproofs are non-malleable (in the Random Oracle Model)
- Sign-then-encrypt with security enhancement and compressed ciphertext
- SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures
- On the insecurity of the Fiat-Shamir signatures with iterative hash functions
- On the concrete security of non-interactive FRI
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
- A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
- Exploring SIDH-based signature parameters
- LESS is more: code-based signatures without syndromes
- On the tightness of forward-secure signature reductions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737261)