Tightly-secure signatures from five-move identification protocols
From MaRDI portal
Recommendations
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Tightly-Secure Signatures from Chameleon Hash Functions
- Optimal security proofs for signatures from identification schemes
- scientific article; zbMATH DE number 2086722
- From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
Cited in
(7)- Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding
- Generic construction for tightly-secure signatures from discrete log
- An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
- Pairing-free blind signatures from CDH assumptions
- Twinkle: threshold signatures from DDH with full adaptive security
- Hierarchical identity-based encryption with tight multi-challenge security
- Optimal tightness for chain-based unique signatures
This page was built for publication: Tightly-secure signatures from five-move identification protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1701435)