Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA
From MaRDI portal
Publication:6070760
DOI10.1007/978-3-031-31368-4_9zbMath1527.94076OpenAlexW4367663867MaRDI QIDQ6070760
Hannah Davis, Zijing Di, Mihir Bellare
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_9
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- Security arguments for digital signatures and blind signatures
- Taming the many EdDSAs
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols
- Does Fiat-Shamir require a cryptographic hash function?
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures
- The theory of hash functions and random oracles. An approach to modern cryptography
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Nonce-Based Cryptography: Retaining Security When Randomness Fails
- Optimal Security Proofs for Signatures from Identification Schemes
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Careful with Composition: Limitations of the Indifferentiability Framework
- High-Speed High-Security Signatures
- Keying Hash Functions for Message Authentication
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Salvaging Merkle-Damgård for Practical Applications
- Hash function requirements for Schnorr signatures
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Leaky Random Oracle (Extended Abstract)
- Theory of Cryptography
This page was built for publication: Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA