A tightly secure ID-based signature scheme under DL assumption in AGM
From MaRDI portal
Publication:6535485
DOI10.1007/978-3-031-35486-1_10zbMATH Open1545.94086MaRDI QIDQ6535485FDOQ6535485
Authors: Jia-Ch'ng Loh, Fuchun Guo, Willy Susilo, Guomin Yang
Publication date: 11 January 2024
Recommendations
- Toward tight security of the Galindo-Garcia identity-based signature
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- Identity-based signatures in standard model
- Galindo-Garcia identity-based signature revisited
Cites Work
- Security arguments for digital signatures and blind signatures
- Short signatures from the Weil pairing
- Identity-based cryptosystems and signature schemes
- New directions in cryptography
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Breaking RSA may not be equivalent to factoring
- Title not available (Why is that?)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- Title not available (Why is that?)
- Galindo-Garcia identity-based signature revisited
- Efficient signature schemes with tight reductions to the Diffie-Hellman problems
- Title not available (Why is that?)
- Public Key Cryptography – PKC 2004
- Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
- Separation Results on the “One-More” Computational Problems
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Security proofs for identity-based identification and signature schemes
- Efficient Identity-Based Signatures Secure in the Standard Model
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- A generic construction of tightly secure signatures in the multi-user setting
- Optimal security proofs for signatures from identification schemes
- The algebraic group model and its applications
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- Improved Bounds on Security Reductions for Discrete Log Based Signatures
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
- An efficient identity-based signature scheme with provable security
- MuSig2: simple two-round Schnorr multi-signatures
- Two-round trip Schnorr multi-signatures via delinearized witnesses
- On pairing-free blind signature schemes in the algebraic group model
- Chain Reductions for Multi-signatures and the HBMS Scheme
Cited In (2)
This page was built for publication: A tightly secure ID-based signature scheme under DL assumption in AGM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535485)