scientific article; zbMATH DE number 1942419
From MaRDI portal
Publication:4409116
zbMath1026.94521MaRDI QIDQ4409116
Mihir Bellare, Adriana Palacio
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420162.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (30)
Two-round trip Schnorr multi-signatures via delinearized witnesses ⋮ MuSig2: simple two-round Schnorr multi-signatures ⋮ Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme ⋮ The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures ⋮ Unprovable security of perfect NIZK and non-interactive non-malleable commitments ⋮ Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage ⋮ The One-More Discrete Logarithm Assumption in the Generic Group Model ⋮ Chain Reductions for Multi-signatures and the HBMS Scheme ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ From Identification to Signatures, Tightly: A Framework and Generic Transforms ⋮ Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures ⋮ An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model ⋮ Practical Schnorr threshold signatures without the algebraic group model ⋮ OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss ⋮ Identification scheme and forward-secure signature in identity-based setting from isogenies ⋮ A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort ⋮ Identification Schemes from Key Encapsulation Mechanisms ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ Improved Zero-Knowledge Identification with Lattices ⋮ Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks ⋮ Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems ⋮ One-Round ID-Based Blind Signature Scheme without ROS Assumption ⋮ Separation Results on the “One-More” Computational Problems ⋮ Tell me the truth: practically public authentication for outsourced databases with multi-user modification ⋮ Concurrent Signatures with Fully Negotiable Binding Control ⋮ Security proofs for identity-based identification and signature schemes ⋮ Optimal Security Proofs for Signatures from Identification Schemes ⋮ Simple Schnorr multi-signatures with applications to bitcoin ⋮ Lattice-based blind signatures, revisited ⋮ Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
This page was built for publication: