We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir trans- form. Concretely, we ...
Nov 17, 2017 · We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir ...
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform.
Concretely, we obtain tightly-secure signatures based on the computational Diffie-Hellman (CDH), the short-exponent CDH, and the Factoring (FAC) assumptions.
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform.
Jan 17, 2018 · Tightly secure signatures from five move identification protocols ; Two Round PAKE from Approximate SPH and Instantiations from Lattices. IACR ...
Tightly-Secure Signatures from Five-Move Identification Protocols · List of references · Publications that cite this publication.
Bibliographic details on Tightly-Secure Signatures from Five-Move Identification Protocols.
Explore a groundbreaking paper presented at Asiacrypt 2017 that delves into tightly secure signatures derived from five-move identification protocols.
People also ask
What is signature protocol?
What is a signature scheme?
In this paper, we present three digital signature schemes with tight security reductions in the random oracle model.