Extended security arguments for signature schemes
From MaRDI portal
Publication:5963366
DOI10.1007/S10623-014-0009-7zbMATH Open1355.94052OpenAlexW1730077839MaRDI QIDQ5963366FDOQ5963366
Authors: Özgür Dagdelen, David Galindo, Pascal Véron, Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel
Publication date: 19 February 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01313619/file/main.pdf
Recommendations
- Extended security arguments for signature schemes
- Optimal security proofs for signatures from identification schemes
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
- scientific article; zbMATH DE number 2086722
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
code-based cryptographyforking lemmaFiat-Shamirsignature schemesmultivariate cryptographyidentification schemes
Cites Work
- Security arguments for digital signatures and blind signatures
- Security proofs for signature schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The knowledge complexity of interactive proof-systems
- Title not available (Why is that?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- A new identification scheme based on syndrome decoding
- Random oracles in a quantum world
- Title not available (Why is that?)
- A second look at Fischlin's transformation
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem
- Title not available (Why is that?)
- Why ``Fiat-Shamir for proofs lacks a proof
- A new NP-complete problem and public-key identification
- The Fiat-Shamir transformation in a quantum world
- Title not available (Why is that?)
- Extended security arguments for signature schemes
- Improved Zero-Knowledge Identification with Lattices
Cited In (6)
- Identity-based signature and extended forking algorithm in the multivariate quadratic setting
- Code-Based Signature Schemes from Identification Protocols in the Rank Metric
- The return of the SDitH
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- Extended security arguments for signature schemes
- A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
This page was built for publication: Extended security arguments for signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5963366)