Tightly secure lattice identity-based signature in the quantum random oracle model
From MaRDI portal
Publication:6535493
DOI10.1007/978-3-031-35486-1_17zbMATH Open1546.81054MaRDI QIDQ6535493
Publication date: 11 January 2024
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Practical and tightly-secure digital signatures and authenticated key exchange
- Bonsai trees, or how to delegate a lattice basis
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Short identity-based signatures with tight security from lattices
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- A decade of lattice cryptography
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Tightly-Secure Signatures from Chameleon Hash Functions
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
- Identity-Based Cryptosystems and Signature Schemes
- Random Oracles in a Quantum World
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient Lattice (H)IBE in the Standard Model
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Lattice-based signatures with tight adaptive corruptions and more
This page was built for publication: Tightly secure lattice identity-based signature in the quantum random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535493)