An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
From MaRDI portal
Publication:6488026
DOI10.1007/978-3-030-65411-5_1zbMath1520.94078MaRDI QIDQ6488026
Publication date: 22 March 2023
Related Items (10)
A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems ⋮ Short signatures from regular syndrome decoding in the head ⋮ Syndrome decoding in the head: shorter signatures from zero-knowledge proofs ⋮ Resumable zero-knowledge for circuits from symmetric key primitives ⋮ MinRank in the head. Short signatures from zero-knowledge proofs ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature ⋮ Banquet: short and fast signatures from AES ⋮ TurboIKOS: improved non-interactive zero knowledge and post-quantum signatures
Cites Work
- Unnamed Item
- Tightly-secure signatures from five-move identification protocols
- Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
- PKP-based signature scheme
- Security Proofs for Signature Schemes
- Extended Security Arguments for Signature Schemes
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures
- A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem
- A new paradigm for public key identification
- An Efficient Parallel Repetition Theorem
- A Lattice-Based Threshold Ring Signature Scheme
- Parallel Repetition of Computationally Sound Protocols Revisited
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A new identification scheme based on syndrome decoding
- Improved Lattice-Based Threshold Ring Signature Scheme
- Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
- LegRoast: Efficient Post-quantum Signatures from the Legendre PRF
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
This page was built for publication: An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes