Efficient signature generation by smart cards

From MaRDI portal
Publication:1180508

DOI10.1007/BF00196725zbMath0743.68058OpenAlexW2095708839WikidataQ29394991 ScholiaQ29394991MaRDI QIDQ1180508

Claus Peter Schnorr

Publication date: 27 June 1992

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00196725




Related Items (only showing first 100 items - show all)

Threshold Schnorr with stateless deterministic signing from standard assumptionsMuSig2: simple two-round Schnorr multi-signaturesTighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsGeneric construction for tightly-secure signatures from discrete logDigital signature scheme set in a hidden cyclic groupConcurrent knowledge extraction in public-key modelsSigned Diffie-Hellman key exchange with tight securityNon-interactive half-aggregation of EdDSA and variants of Schnorr signaturesA closer look at multiple forking: leveraging (in)dependence for a tighter boundA novel version of the hidden logarithm problem for post-quantum signature algorithmsFiat-Shamir for highly sound protocols is instantiableComments on efficient batch verification test for digital signatures based on elliptic curvesTightly secure signatures from lossy identification schemesImplementing secure reporting of sexual misconduct -- revisiting WhoTooSoK: communication across distributed ledgersFPPW: a fair and privacy preserving watchtower for bitcoinEfficient discrete logarithm based multi-signature scheme in the plain public key modelA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointCryptanalysis of the rank preserving signatureIssuer-hiding attribute-based credentialsThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesDecentralized asset custody scheme with security against rational adversaryA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionThe wonderful world of global random oraclesMessage recovery for signature schemes based on the discrete logarithm problemZero-knowledge proofs of retrievabilityA novel deniable authentication protocol using generalized ElGamal signature schemeAnonymous single-sign-on for \(n\) designated services with traceabilityStacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctionsShort pairing-free blind signatures with exponential securityShort signatures from Diffie-Hellman: realizing almost compact public keyFast batch modular exponentiation with common-multiplicand multiplicationSecure electronic bills of lading: Blind counts and digital signaturesA general compiler for password-authenticated group key exchange protocol in the standard modelAlgebraic generalization of Diffie-Hellman key exchangeThe random oracle model: a twenty-year retrospectiveKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeKCI-resilient anonymous wireless link-layer authentication protocolsExtending concurrent signature to multiple partiesAn efficient collision detection method for computing discrete logarithms with Pollard's rhoAn efficient certificateless aggregate signature without pairings for vehicular ad hoc networksSecure proxy signature schemes for delegation of signing rightsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationImproved algebraic MACs and practical keyed-verification anonymous credentialsIdentity-based chameleon hashing and signatures without key exposureFair exchange of valuable information: a generalised frameworkGroup-oriented fair exchange of signaturesRobust digital signature revisitedZero-knowledge identification scheme based on Weil pairingImproved Pollard rho method for computing discrete logarithms over finite extension fieldsComputing elliptic curve discrete logarithms with the negation mapOn the impossibility of structure-preserving deterministic primitivesA note on asynchronous multi-exponentiation algorithm using binary representationSpeeding-up verification of digital signaturesFault-based attack on Montgomery's ladder algorithmSeveral cryptographic applications of \(\Sigma\)-protocolPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsEfficient algorithms for secure outsourcing of bilinear pairingsConcurrent signature without random oraclesA characterization of chameleon hash functions and new, efficient designsSeveral practical protocols for authentication and key exchangeA framework for non-interactive instance-dependent commitment schemes (NIC)On Schnorr's preprocessing for digital signature schemesEfficient generic on-line/off-line (threshold) signatures without key exposureFair signature exchange via delegation on ubiquitous networksA new proxy signature scheme with revocationSelf-generated-certificate public key encryption without pairing and its applicationPractical electronic auction scheme with strong anonymity and bidding privacyA new threshold authenticated encryption scheme using labor-division signatureGeneric security-amplifying methods of ordinary digital signaturesNew number-theoretic cryptographic primitivesDelegating a product of group exponentiations with application to signature schemesImproved batch exponentiationIndiscreet logarithms in finite fields of small characteristicImproved attacks on knapsack problem with their variants and a knapsack type ID-schemeSecurity of self-certified signaturesFormalising \(\varSigma\)-protocols and commitment schemes using cryptholCertificateless threshold ring signatureAlgorithms of information authentication for the automatic control systems on the basis of structures in finite vector spacesLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresA note on universal composable zero-knowledge in the common reference string modelOn the amortized complexity of zero-knowledge protocolsNew algorithms and protocols for information authentication in automatic control systemsSecurity of hedged Fiat-Shamir signatures under fault attacksSignatures from sequential-OR proofsBandwidth-efficient threshold EC-DSAHybrid commitments and their applications to zero-knowledge proof systemsTwo-party adaptor signatures from identification schemesSimple Schnorr multi-signatures with applications to bitcoinInformation authentication in automated control systems based on finite groups with multidimensional cyclicitySigned (group) Diffie-Hellman key exchange with tight securityQuantifying the security cost of migrating protocols to practiceLattice-based blind signatures, revisitedRobust threshold DSS signaturesEfficient chain-encryption-based quantum signature scheme with semi-trusted arbitratorSmall generic hardcore subsets for the discrete logarithm: short secret DL-keys.Quantum signature without classical private keyPractical (fully) distributed signatures provably secure in the standard modelBlind Schnorr signatures and signed ElGamal encryption in the algebraic group modelOn instantiating the algebraic group model from falsifiable assumptions



Cites Work


This page was built for publication: Efficient signature generation by smart cards