Generic construction for tightly-secure signatures from discrete log
From MaRDI portal
Publication:820557
DOI10.1016/j.tcs.2021.07.014OpenAlexW3184776544MaRDI QIDQ820557
Jianchang Lai, Willy Susilo, Zhen Zhao, Peng Jiang, Fuchun Guo, Ge Wu
Publication date: 27 September 2021
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2021.07.014
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security of signature schemes in a multi-user setting
- Efficient signature generation by smart cards
- Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
- Tightly-secure signatures from five-move identification protocols
- Practical and tightly-secure digital signatures and authenticated key exchange
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures
- Short tightly secure signatures for signing a vector of group elements: a new approach
- A generic construction of tightly secure signatures in the multi-user setting
- Short unique signatures from RSA with a tight security reduction (in the random oracle model)
- Optimal Security Proofs for Signatures from Identification Schemes
- Security Proofs for Signature Schemes
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
- Waters Signatures with Optimal Security Reduction
- On Tight Security Proofs for Schnorr Signatures
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Practical Identity-Based Encryption Without Random Oracles
- Programmable Hash Functions and Their Applications
- Improved Bounds on Security Reductions for Discrete Log Based Signatures
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Tightly-Secure Authenticated Key Exchange
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- On the Impossibility of Tight Cryptographic Reductions
This page was built for publication: Generic construction for tightly-secure signatures from discrete log