Code-based secret handshake scheme, revisited
From MaRDI portal
Publication:6550613
DOI10.1007/978-3-031-50594-2_6MaRDI QIDQ6550613
Publication date: 5 June 2024
secret handshakecode equivalence problemCA-oblivious encryptioncode-based constructionLESS-FM signatures
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Secret handshakes from ID-based message recovery signatures: a new generic approach
- Semantic security for the McEliece cryptosystem without random oracles
- LESS-FM: fine-tuning signatures from the code equivalence problem
- Lattice-based secret handshakes with reusable credentials
- Secret handshakes: full dynamicity, deniability and lattice-based design
- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- LESS is More: Code-Based Signatures Without Syndromes
- A Distinguisher for High-Rate McEliece Cryptosystems
- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
- Secret Handshakes from CA-Oblivious Encryption
- Applied Cryptography and Network Security
- On the computational hardness of the code equivalence problem in cryptography
- CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
This page was built for publication: Code-based secret handshake scheme, revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6550613)