Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log

From MaRDI portal
Publication:5451061

DOI10.1007/11593447_1zbMath1146.94305OpenAlexW1508759756MaRDI QIDQ5451061

Damien Vergnaud, Pascal Paillier

Publication date: 18 March 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11593447_1




Related Items

Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsGeneric construction for tightly-secure signatures from discrete logAnother Look at TightnessOn the Joint Security of Encryption and Signature in EMVAnother look at extraction and randomization of Groth's zk-SNARKTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionOn methods of shortening ElGamal-type signaturesLogarithmic-size ring signatures with tight security from the DDH assumptionOptimal tightness for chain-based unique signaturesThe random oracle model: a twenty-year retrospectiveOn tightly-secure (linkable) ring signaturesDigital Signatures with Memory-Tight Security in the Multi-challenge SettingThe One-More Discrete Logarithm Assumption in the Generic Group ModelChain Reductions for Multi-signatures and the HBMS SchemeOn tight security proofs for Schnorr signaturesOn pairing-free blind signature schemes in the algebraic group modelThe price of verifiability: lower bounds for verifiable random functionsAn analysis of the algebraic group modelOn the tightness of forward-secure signature reductionsTighter Reductions for Forward-Secure Signature SchemesImproved Bounds on Security Reductions for Discrete Log Based SignaturesSeparation Results on the “One-More” Computational ProblemsA synthetic indifferentiability analysis of some block-cipher-based hash functionsHash function requirements for Schnorr signaturesSignatures from sequential-OR proofsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Anonymity from Public Key Encryption to Undeniable SignaturesImpossibility on tamper-resilient cryptography with uniqueness propertiesMore efficient digital signatures with tight multi-user securityOptimal Security Proofs for Signatures from Identification SchemesIdentity-based signatures in standard modelOn Related-Secret PseudorandomnessSimple Schnorr multi-signatures with applications to bitcoinA classification of computational assumptions in the algebraic group modelBlack-box use of one-way functions is useless for optimal fair coin-tossingBlind Schnorr signatures and signed ElGamal encryption in the algebraic group modelOn instantiating the algebraic group model from falsifiable assumptions