Compact identity-based signature and puncturable signature from SQISign
From MaRDI portal
Publication:6547873
DOI10.1007/978-981-97-1235-9_15MaRDI QIDQ6547873
Publication date: 31 May 2024
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Cryptographic hash functions from expander graphs
- Non-interactive multiparty computation without correlated randomness
- CSIDH: an efficient post-quantum commutative group action
- Die Typen der Multiplikatorenringe elliptischer Funktionenkörper.
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Disappearing cryptography in the bounded storage model
- Identification scheme and forward-secure signature in identity-based setting from isogenies
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Identity-based Signatures from Lattices: Simpler, Faster, Shorter*
- Analysis of the Blockchain Protocol in Asynchronous Networks
- Constructing elliptic curve isogenies in quantum subexponential time
- New Negative Results on Differing-Inputs Obfuscation
- An efficient identity-based signature scheme with provable security
- Puncturable signature: a generic construction and instantiations
This page was built for publication: Compact identity-based signature and puncturable signature from SQISign
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547873)