Digital Signatures with Memory-Tight Security in the Multi-challenge Setting
From MaRDI portal
Publication:6041292
DOI10.1007/978-3-030-92068-5_14zbMath1514.94151OpenAlexW3202828554MaRDI QIDQ6041292
Tibor Jager, Denis Diemert, Kai Gellert, Lin Lyu
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_14
Related Items (3)
Optimal tightness for chain-based unique signatures ⋮ Hiding in plain sight: memory-tight proofs via randomness programming ⋮ Memory-tight multi-challenge security of public-key encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tightly secure signatures from lossy identification schemes
- Memory lower bounds of reductions revisited
- Memory-tight reductions
- Multi-key authenticated encryption with corruptions: reductions are lossy
- On the one-per-message unforgeability of (EC)DSA and its variants
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH
- Optimal security proofs for full domain hash. Revisited
- Short signatures from the Weil pairing
- Practical and tightly-secure digital signatures and authenticated key exchange
- More efficient digital signatures with tight multi-user security
- The memory-tightness of authenticated encryption
- On the memory-tightness of hashed ElGamal
- Highly efficient key exchange protocols with optimal tightness
- On tight security proofs for Schnorr signatures
- Two-pass authenticated key exchange with explicit authentication and tight security
- Tightly CCA-Secure Encryption Without Pairings
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Optimal Security Proofs for Full Domain Hash, Revisited
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
- Tightly-Secure Signatures from Lossy Identification Schemes
- Waters Signatures with Optimal Security Reduction
- Tightly Secure Signatures and Public-Key Encryption
- On Tight Security Proofs for Schnorr Signatures
- Tight Proofs for Signature Schemes without Random Oracles
- Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
- Improved Bounds on Security Reductions for Discrete Log Based Signatures
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
- Tightly-Secure Authenticated Key Exchange
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- The Multi-user Security of Double Encryption
- On the Impossibility of Tight Cryptographic Reductions
This page was built for publication: Digital Signatures with Memory-Tight Security in the Multi-challenge Setting