Security proofs for identity-based identification and signature schemes
From MaRDI portal
Publication:1027974
DOI10.1007/s00145-008-9028-8zbMath1166.94008OpenAlexW2067809562MaRDI QIDQ1027974
Chanathip Namprempre, Gregory Neven, Mihir Bellare
Publication date: 30 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-558.pdf
Related Items (14)
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures ⋮ Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem ⋮ An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem ⋮ A generic construction of tightly secure signatures in the multi-user setting ⋮ Identity-based interactive aggregate signatures from lattices ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Identification scheme and forward-secure signature in identity-based setting from isogenies ⋮ Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Attribute-Based Signatures ⋮ Identity-Based Deterministic Signature Scheme without Forking-Lemma ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Tightly secure signature schemes from the LWE and subset sum assumptions
Cites Work
- Zero-knowledge proofs of identity
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- Security arguments for digital signatures and blind signatures
- On the security of a practical identification scheme
- Identity-Based Cryptosystems and Signature Schemes
- Security of 2t-Root Identification and Signatures
- Transitive Signatures: New Schemes and Proofs
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A modification of the RSA public-key encryption procedure (Corresp.)
- Remarks on soundness of proofs
- Hierarchical ID-Based Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Strong Key-Insulated Signature Schemes
- Advances in Cryptology - EUROCRYPT 2004
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- Public Key Cryptography – PKC 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Security proofs for identity-based identification and signature schemes