Threshold raccoon: practical threshold signatures from standard lattice assumptions
From MaRDI portal
Publication:6636506
DOI10.1007/978-3-031-58723-8_8MaRDI QIDQ6636506
Could not fetch data.
Publication date: 12 November 2024
Could not fetch data.
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the concrete hardness of learning with errors
- FROST: Flexible round-optimized Schnorr threshold signatures
- Efficient signature generation by smart cards
- Adaptively secure distributed PRFs from LWE
- Shortest vector from lattice sieving: a few dimensions for free
- A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
- Threshold cryptosystems from threshold fully homomorphic encryption
- Rounded Gaussians -- fast and secure constant-time sampling for lattice-based crypto
- Threshold schemes from isogeny assumptions
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- Key Homomorphic PRFs and Their Applications
- Lattice Signatures without Trapdoors
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
- Born and raised distributively
- How to share a secret
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- Threshold Cryptosystems Based on Factoring
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
- A Convenient Method for Generating Normal Variables
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- MuSig-L: lattice-based multi-signature with single-round online phase
- Better than advertised security for non-interactive threshold signatures
- A detailed analysis of Fiat-Shamir with aborts
- Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium
- Toward practical lattice-based proof of knowledge from Hint-MLWE
- Round-optimal lattice-based threshold signatures, revisited
This page was built for publication: Threshold raccoon: practical threshold signatures from standard lattice assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636506)