Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Hash-and-Sign Signatures Without the Random Oracle - MaRDI portal

Secure Hash-and-Sign Signatures Without the Random Oracle

From MaRDI portal
Publication:4250758

DOI10.1007/3-540-48910-X_9zbMath1038.94533MaRDI QIDQ4250758

Rosario Gennaro, Tal Rabin, Shai Halevi

Publication date: 1999

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)




Related Items (46)

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreTightly secure signatures and public-key encryptionTightly secure signatures from lossy identification schemesZero-knowledge proofs for set membership: efficient, succinct, modularA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringKey regeneration-free ciphertext-policy attribute-based encryption and its applicationShort signatures from Diffie-Hellman: realizing almost compact public keyA new definition of homomorphic signature for identity management in mobile cloud computingThe random oracle model: a twenty-year retrospectiveExplainable argumentsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionThreshold proxy re-signatureLocally verifiable signature and key aggregationInner product functional commitments with constant-size public parameters and openingsShort signatures without random oracles and the SDH assumption in bilinear groupsIntrusion-resilient identity-based signatures: concrete scheme in the standard model and generic constructionHow (not) to design strong-RSA signaturesFair exchange of valuable information: a generalised frameworkIncrementally aggregatable vector commitments and applications to verifiable decentralized storageProgrammable hash functions and their applicationsA Signature Scheme with Efficient Proof of ValidityАтаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия имSubversion-resilient signatures: definitions, constructions and applicationsEfficient digital signatures from RSA without random oraclesEfficient certificateless threshold signatures without random oraclesZero-knowledge proofs for set membership: efficient, succinct, modularGeneric security-amplifying methods of ordinary digital signaturesProgrammable Hash Functions and Their ApplicationsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesAsymptotically Efficient Lattice-Based Digital SignaturesFaster and Shorter Password-Authenticated Key ExchangeAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyTight security for signature schemes without random oraclesProxy Re-signature Schemes Without Random OraclesStatistically Hiding SetsShort Redactable Signatures Using Random TreesRealizing Hash-and-Sign Signatures under Standard AssumptionsReducing the Complexity in the Distributed Computation of Private RSA KeysNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesA Storage Efficient Redactable Signature in the Standard ModelNew approaches for deniable authenticationHow to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash FunctionsGeneric groups, collision resistance, and ECDSASanitizable SignaturesAuthenticated hash tables based on cryptographic accumulators




This page was built for publication: Secure Hash-and-Sign Signatures Without the Random Oracle