Extended security arguments for signature schemes
From MaRDI portal
Publication:5963366
Recommendations
- Extended security arguments for signature schemes
- Optimal security proofs for signatures from identification schemes
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
- scientific article; zbMATH DE number 2086722
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
Cites work
- scientific article; zbMATH DE number 1676653 (Why is no real title available?)
- scientific article; zbMATH DE number 1302859 (Why is no real title available?)
- scientific article; zbMATH DE number 1162684 (Why is no real title available?)
- scientific article; zbMATH DE number 2086722 (Why is no real title available?)
- scientific article; zbMATH DE number 1406778 (Why is no real title available?)
- A new NP-complete problem and public-key identification
- A new identification scheme based on syndrome decoding
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A second look at Fischlin's transformation
- A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- Extended security arguments for signature schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Improved Zero-Knowledge Identification with Lattices
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- Random oracles in a quantum world
- Security arguments for digital signatures and blind signatures
- Security proofs for signature schemes
- The Fiat-Shamir transformation in a quantum world
- The knowledge complexity of interactive proof-systems
- Why ``Fiat-Shamir for proofs lacks a proof
Cited in
(6)- Identity-based signature and extended forking algorithm in the multivariate quadratic setting
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- Extended security arguments for signature schemes
- A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
- Code-Based Signature Schemes from Identification Protocols in the Rank Metric
- The return of the SDitH
This page was built for publication: Extended security arguments for signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5963366)