We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir trans- form. Concretely, we ...
Nov 17, 2017 · We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir ...
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform.
Concretely, we obtain tightly-secure signatures based on the computational Diffie-Hellman (CDH), the short-exponent CDH, and the Factoring (FAC) assumptions.
Jan 17, 2018 · Tightly secure signatures from five move identification protocols. 203 views · 6 years ago ...more. IACR. 9.58K. Subscribe. Like. Share.
Explore a groundbreaking paper presented at Asiacrypt 2017 that delves into tightly secure signatures derived from five-move identification protocols.
Bibliographic details on Tightly-Secure Signatures from Five-Move Identification Protocols.
Tightly-Secure Signatures from Five-Move Identification Protocols · List of references · Publications that cite this publication.
Tightly-secure signatures from five-move identification protocols. E Kiltz, J Loss, J Pan. International Conference on the Theory and Application of ...
Tightly-secure signatures from five-move identification protocols. E Kiltz, J Loss, J Pan. International Conference on the Theory and Application of ...