On the Impossibility of Tight Cryptographic Reductions

From MaRDI portal
Publication:5739205

DOI10.1007/978-3-662-49896-5_10zbMath1369.94519OpenAlexW2409148419MaRDI QIDQ5739205

Christoph Bader, Tibor Jager, Sven Schäge, Yong Li

Publication date: 15 July 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_10




Related Items (36)

Generic construction for tightly-secure signatures from discrete logPractical isogeny-based key-exchange with optimal tightnessOn the security loss of unique signaturesQuantum algorithms for the \(k\)-XOR problemAuthenticated key exchange and signatures with tight security in the standard modelTightness subtleties for multi-user PKE notionsMemory lower bounds of reductions revisitedOptimal tightness for chain-based unique signaturesOn the concrete security of TLS 1.3 PSK modeKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeDigital Signatures with Memory-Tight Security in the Multi-challenge SettingDeniable authentication when signing keys leakAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelMulti-instance secure public-key encryptionLattice-based signatures with tight adaptive corruptions and moreAdaptive multiparty NIKEThe power of undirected rewindings for adaptive securityOn optimal tightness for key exchange with full forward secrecy via key confirmationOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelOn the adaptive security of MACs and PRFsTowards tight adaptive security of non-interactive key exchangeOrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit lossA formal security analysis of the Signal messaging protocolSimple and more efficient PRFs with tight security from LWE and matrix-DDHOn the tightness of forward-secure signature reductionsGeneralized public-key cryptography with tight securitySecurity of BLS and BGLS signatures in a multi-user settingOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsTightly-secure authenticated key exchange, revisitedImpossibility on tamper-resilient cryptography with uniqueness propertiesMore efficient digital signatures with tight multi-user securityVerifiable random functions with optimal tightnessBlack-box use of one-way functions is useless for optimal fair coin-tossingTighter proofs for the SIGMA and TLS 1.3 key exchange protocols




This page was built for publication: On the Impossibility of Tight Cryptographic Reductions