Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
From MaRDI portal
Publication:5756535
DOI10.1007/978-3-540-71677-8_14zbMath1127.94019OpenAlexW2166403741MaRDI QIDQ5756535
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_14
Related Items (34)
MuSig2: simple two-round Schnorr multi-signatures ⋮ Tightly secure signatures and public-key encryption ⋮ Fiat-Shamir for highly sound protocols is instantiable ⋮ Attribute-based versions of Schnorr and ElGamal ⋮ Structure-Preserving Signatures from Standard Assumptions, Revisited ⋮ Constant-size structure-preserving signatures: generic constructions and simple assumptions ⋮ On the security of two identity-based conditional proxy re-encryption schemes ⋮ Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency ⋮ The One-More Discrete Logarithm Assumption in the Generic Group Model ⋮ How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones ⋮ Identity-based encryption in DDH hard groups ⋮ A Generic Construction of Integrated Secure-Channel Free PEKS and PKE ⋮ Comment on: ``An efficient identity-based signature scheme with provable security ⋮ Non-malleable vector commitments via local equivocability ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ How to protect privacy in optimistic fair exchange of digital signatures ⋮ Tagged One-Time Signatures: Tight Security and Optimal Tag Size ⋮ Compact structure-preserving signatures with almost tight security ⋮ Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts ⋮ A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication ⋮ Generic security-amplifying methods of ordinary digital signatures ⋮ Hash Functions from Sigma Protocols and Improvements to VSH ⋮ Non-Interactive Zero-Knowledge Proofs of Non-Membership ⋮ An identity-based strongly unforgeable signature without random oracles from bilinear pairings ⋮ Non-malleable vector commitments via local equivocability ⋮ Another look at non-standard discrete log and Diffie-Hellman problems ⋮ An Efficient Post-Quantum One-Time Signature Scheme ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Two-party adaptor signatures from identification schemes ⋮ Fiat–Shamir for Highly Sound Protocols Is Instantiable ⋮ Efficient fully structure-preserving signatures and shrinking commitments ⋮ Sanitizable Signatures Revisited
This page was built for publication: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles