Security of signature schemes in a multi-user setting
From MaRDI portal
Publication:702188
DOI10.1023/B:DESI.0000036250.18062.3FzbMATH Open1077.94016WikidataQ56637342 ScholiaQ56637342MaRDI QIDQ702188FDOQ702188
Publication date: 17 January 2005
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Recommendations
- Security for Signcryption: The Multi-User Model
- Security of a multisignature scheme for specified group of verifiers
- Security of BLS and BGLS signatures in a multi-user setting
- Signatures with Tight Multi-user Security from Search Assumptions
- A generic construction of tightly secure signatures in the multi-user setting
- More efficient digital signatures with tight multi-user security
- scientific article; zbMATH DE number 1759663
- Computational Science and Its Applications – ICCSA 2004
- Multi-verifier signatures
- Security of signature schemes in the presence of key-dependent messages
Cited In (26)
- How to achieve non-repudiation of origin with privacy protection in cloud computing
- Generic construction for tightly-secure signatures from discrete log
- Weaknesses in some multisignature schemes for specified group of verifiers.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Certificateless Public Key Signature Schemes from Standard Algorithms
- Signatures with Tight Multi-user Security from Search Assumptions
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- Information Security and Cryptology
- Connecting tweakable and multi-key blockcipher security
- Атаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия им
- Public key signatures in the multi-user setting.
- Probabilistic hash-and-sign with retry in the quantum random oracle model
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- The lattice-based digital signature scheme qTESLA
- On the security of the Courtois-Finiasz-Sendrier signature
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
- A key substitution attack on SFLASHv3
- How (not) to design strong-RSA signatures
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
- Generic groups, collision resistance, and ECDSA
- Another Look at Tightness
- Security of BLS and BGLS signatures in a multi-user setting
- Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
- On the tightness of forward-secure signature reductions
This page was built for publication: Security of signature schemes in a multi-user setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q702188)