MuSig-L: lattice-based multi-signature with single-round online phase
From MaRDI portal
Publication:6104337
DOI10.1007/978-3-031-15979-4_10zbMath1517.94184OpenAlexW4312816268MaRDI QIDQ6104337
Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
Publication date: 28 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-15979-4_10
Related Items
Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions ⋮ A framework for practical anonymous credentials from lattices ⋮ \textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulation ⋮ Masking the GLP lattice-based signature scheme at any order
Cites Work
- Unnamed Item
- FROST: Flexible round-optimized Schnorr threshold signatures
- Secure distributed key generation for discrete-log based cryptosystems
- Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs
- Threshold cryptosystems from threshold fully homomorphic encryption
- More efficient commitments from structured lattice assumptions
- An efficient lattice-based multisignature scheme with applications to bitcoins
- Implementation of lattice trapdoors on modules and applications
- Threshold Schnorr with stateless deterministic signing from standard assumptions
- Two-round trip Schnorr multi-signatures via delinearized witnesses
- MuSig2: simple two-round Schnorr multi-signatures
- Simple Schnorr multi-signatures with applications to bitcoin
- A lattice-based provably secure multisignature scheme in quantum random oracle model
- Hardness of SIS and LWE with Small Parameters
- Discrete Gaussian Leftover Hash Lemma over Infinite Domains
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Lattice Signatures without Trapdoors
- Multiparty Computation from Somewhat Homomorphic Encryption
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
- A Toolkit for Ring-LWE Cryptography
- Isochronous Gaussian Sampling: From Inception to Implementation
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- One-Shot Verifiable Encryption from Lattices
- On the (in)security of ROS
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Chain Reductions for Multi-signatures and the HBMS Scheme