Security of signature schemes in a multi-user setting
From MaRDI portal
Publication:702188
DOI10.1023/B:DESI.0000036250.18062.3fzbMath1077.94016WikidataQ56637342 ScholiaQ56637342MaRDI QIDQ702188
Alfred J. Menezes, Nigel P. Smart
Publication date: 17 January 2005
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Related Items
Generic construction for tightly-secure signatures from discrete log ⋮ Another Look at Tightness ⋮ On the security of the Courtois-Finiasz-Sendrier signature ⋮ Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes ⋮ Malleability and ownership of proxy signatures: towards a stronger definition and its limitations ⋮ Connecting tweakable and multi-key blockcipher security ⋮ How to achieve non-repudiation of origin with privacy protection in cloud computing ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ How (not) to design strong-RSA signatures ⋮ On the tightness of forward-secure signature reductions ⋮ The lattice-based digital signature scheme qTESLA ⋮ Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им ⋮ Security of BLS and BGLS signatures in a multi-user setting ⋮ A key substitution attack on SFLASHv3 ⋮ Key Substitution in the Symbolic Analysis of Cryptographic Protocols ⋮ Generic groups, collision resistance, and ECDSA ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption