Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Any time
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
Verbatim
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir trans- form. Concretely, we ...
Nov 17, 2017 · We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir ...
We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform.
Concretely, we obtain tightly-secure signatures based on the computational Diffie-Hellman (CDH), the short-exponent CDH, and the Factoring (FAC) assumptions.
Jan 17, 2018 · Tightly secure signatures from five move identification protocols. 203 views · 6 years ago ...more. IACR. 9.58K. Subscribe. Like. Share.
Explore a groundbreaking paper presented at Asiacrypt 2017 that delves into tightly secure signatures derived from five-move identification protocols.
Bibliographic details on Tightly-Secure Signatures from Five-Move Identification Protocols.
Tightly-Secure Signatures from Five-Move Identification Protocols · List of references · Publications that cite this publication.
Tightly-secure signatures from five-move identification protocols. E Kiltz, J Loss, J Pan. International Conference on the Theory and Application of ...
Tightly-secure signatures from five-move identification protocols. E Kiltz, J Loss, J Pan. International Conference on the Theory and Application of ...