Sequential Aggregate Signatures and Multisignatures Without Random Oracles
From MaRDI portal
Publication:3593112
DOI10.1007/11761679_28zbMath1140.94358OpenAlexW1505884345MaRDI QIDQ3593112
Hovav Shacham, Steve Lu, Brent Waters, Amit Sahai, Rafail Ostrovsky
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_28
Related Items
Two-round trip Schnorr multi-signatures via delinearized witnesses ⋮ Another Look at Tightness ⋮ Key-insulated aggregate signature ⋮ Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles ⋮ A quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster state ⋮ Efficient discrete logarithm based multi-signature scheme in the plain public key model ⋮ Robust subgroup multi-signatures for consensus ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Chain Reductions for Multi-signatures and the HBMS Scheme ⋮ Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions ⋮ Batch arguments for \textsf{NP} and more from standard bilinear group assumptions ⋮ Locally verifiable signature and key aggregation ⋮ Multi-signatures for ECDSA and its applications in blockchain ⋮ Half-aggregation of Schnorr signatures with tight reductions ⋮ Pointcheval-Sanders signature-based synchronized aggregate signature ⋮ Identity-based interactive aggregate signatures from lattices ⋮ Secure proxy signature schemes for delegation of signing rights ⋮ Non-interactive multisignatures in the plain public-key model with efficient verification ⋮ Efficient traceable signatures in the standard model ⋮ Attribute-based optimistic fair exchange: how to restrict brokers with policies ⋮ Certificate-based verifiably encrypted signatures from pairings ⋮ Sequential aggregate signatures with lazy verification from trapdoor permutations ⋮ Optimistic fair exchange in the enhanced chosen-key model ⋮ Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Non-Interactive Key Exchange ⋮ Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Comparing two pairing-based aggregate signature schemes ⋮ Confined guessing: new signatures from standard assumptions ⋮ Proxy Signatures Secure Against Proxy Key Exposure ⋮ Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures ⋮ An enhanced \((t,n)\) threshold directed signature scheme ⋮ Multi-key Hierarchical Identity-Based Signatures ⋮ Efficient Sequential Aggregate Signed Data ⋮ Practical Short Signature Batch Verification ⋮ Security of Verifiably Encrypted Signatures and a Construction without Random Oracles ⋮ Efficient Traceable Signatures in the Standard Model ⋮ Two-party adaptor signatures from identification schemes ⋮ Simple Schnorr multi-signatures with applications to bitcoin ⋮ Sequential aggregate signatures with short public keys without random oracles
Cites Work
- Unnamed Item
- Unnamed Item
- Secure proxy signature schemes for delegation of signing rights
- Short signatures from the Weil pairing
- The random oracle methodology, revisited
- Perfect Non-interactive Zero Knowledge for NP
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Optimistic fair exchange of digital signatures
- A digital multisignature scheme using bijective public-key cryptosystems
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Pairing-Friendly Elliptic Curves of Prime Order
- Cryptography and Coding
- Theory of Cryptography
- Information Security and Cryptology - ICISC 2005
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003