Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
From MaRDI portal
Publication:5756535
DOI10.1007/978-3-540-71677-8_14zbMATH Open1127.94019OpenAlexW2166403741MaRDI QIDQ5756535FDOQ5756535
Authors: M. Bellare, Sarah Shoup
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_14
Recommendations
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
- scientific article; zbMATH DE number 2086722
- On the insecurity of the Fiat-Shamir signatures with iterative hash functions
- Fiat-Shamir for highly sound protocols is instantiable
- On the (in)security of Fischlin's paradigm
Cited In (34)
- MuSig2: simple two-round Schnorr multi-signatures
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
- Non-Interactive Zero-Knowledge Proofs of Non-Membership
- Structure-preserving signatures from standard assumptions, revisited
- Generic security-amplifying methods of ordinary digital signatures
- Another look at non-standard discrete log and Diffie-Hellman problems
- The One-More Discrete Logarithm Assumption in the Generic Group Model
- A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
- How to protect privacy in optimistic fair exchange of digital signatures
- Tightly secure signatures and public-key encryption
- Fiat-Shamir for highly sound protocols is instantiable
- Fiat-Shamir for highly sound protocols is instantiable
- Hash Functions from Sigma Protocols and Improvements to VSH
- Attribute-based versions of Schnorr and ElGamal
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Identity-based encryption in DDH hard groups
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- An efficient post-quantum one-time signature scheme
- Comment on: ``An efficient identity-based signature scheme with provable security
- How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
- On the security of two identity-based conditional proxy re-encryption schemes
- One-time signatures and chameleon hash functions
- Tagged one-time signatures: tight security and optimal tag size
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
- New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
- Compact structure-preserving signatures with almost tight security
- A characterization of chameleon hash functions and new, efficient designs
- Two-party adaptor signatures from identification schemes
- Sanitizable Signatures Revisited
- Efficient fully structure-preserving signatures and shrinking commitments
- Non-malleable vector commitments via local equivocability
- Non-malleable vector commitments via local equivocability
- Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings
This page was built for publication: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5756535)