PKP-based signature scheme
From MaRDI portal
Publication:2179377
DOI10.1007/978-3-030-35423-7_1zbMath1456.94049OpenAlexW2889463786MaRDI QIDQ2179377
Ludovic Perret, Gilles Macario-Rat, Eliane Koussa, Jean-Charles Faugère, Ward Beullens, Jacques Patarin
Publication date: 12 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-35423-7_1
public-key cryptographyFiat-Shamirpost-quantum cryptographypermuted kernel problem5-pass identification schemepublic-key signature
Related Items (3)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Permuted puzzles and cryptographic hardness ⋮ Cryptanalysis of the binary permuted kernel problem
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Some remarks on the security of the identification scheme based on permuted kernels
- A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Post-quantum security of Fiat-Shamir
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures
- How Risky Is the Random-Oracle Model?
- Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Strengths and Weaknesses of Quantum Computing
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- Strengthening Digital Signatures Via Randomized Hashing
This page was built for publication: PKP-based signature scheme