Threshold ring signatures: new definitions and post-quantum security
From MaRDI portal
Publication:2055701
DOI10.1007/978-3-030-45388-6_15zbMath1481.94140OpenAlexW3022791834MaRDI QIDQ2055701
Abida Haque, Alessandra Scafuro
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-45388-6_15
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (5)
Stronger notions and a more efficient construction of threshold ring signatures ⋮ Extendable threshold ring signatures with enhanced anonymity ⋮ Efficient proofs of knowledge for threshold relations ⋮ Count me in! Extendability for threshold ring signatures ⋮ Threshold signatures with private accountability
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A multivariate based threshold ring signature scheme
- Minimum disclosure proofs of knowledge
- Threshold cryptosystems from threshold fully homomorphic encryption
- Revisiting post-quantum Fiat-Shamir
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Post-quantum security of Fiat-Shamir
- Designated Verifier Proofs and Their Applications
- Quantum Proofs of Knowledge
- Zero-knowledge against quantum attacks
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Collapse-Binding Quantum Commitments Without Random Oracles
- How to share a secret
- Random Oracles in a Quantum World
- A Lattice-Based Threshold Ring Signature Scheme
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Group Signatures
- 1-out-of-n Signatures from a Variety of Keys
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Improved Lattice-Based Threshold Ring Signature Scheme
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- On the Security Models of (Threshold) Ring Signature Schemes
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology - ICISC 2003
- Theory of Cryptography
This page was built for publication: Threshold ring signatures: new definitions and post-quantum security