Security of signature schemes in a multi-user setting
From MaRDI portal
Publication:702188
DOI10.1023/B:DESI.0000036250.18062.3fzbMath1077.94016WikidataQ56637342 ScholiaQ56637342MaRDI QIDQ702188
Alfred J. Menezes, Nigel P. Smart
Publication date: 17 January 2005
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Related Items
Key Substitution in the Symbolic Analysis of Cryptographic Protocols, A key substitution attack on SFLASHv3, How to achieve non-repudiation of origin with privacy protection in cloud computing, Security of BLS and BGLS signatures in a multi-user setting, On the security of the Courtois-Finiasz-Sendrier signature, On the tightness of forward-secure signature reductions, Malleability and ownership of proxy signatures: towards a stronger definition and its limitations, The lattice-based digital signature scheme qTESLA, Connecting tweakable and multi-key blockcipher security, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, How (not) to design strong-RSA signatures, Generic groups, collision resistance, and ECDSA, A strong designated verifier signature scheme tightly related to the LRSW assumption, Another Look at Tightness, Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes