Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
From MaRDI portal
Publication:826296
DOI10.1007/978-3-030-75539-3_24zbMath1479.94302OpenAlexW3157430170MaRDI QIDQ826296
Yashvanth Kondi, François Garillot, Konstantinos Chalkias, Valeria Nikolaenko
Publication date: 20 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75539-3_24
Related Items (4)
SoK: blockchain light clients ⋮ Half-aggregation of Schnorr signatures with tight reductions ⋮ Improved straight-line extraction in the random oracle model with applications to signature aggregation ⋮ Pointcheval-Sanders signature-based synchronized aggregate signature
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient discrete logarithm based multi-signature scheme in the plain public key model
- Efficient secure two-party protocols. Techniques and constructions
- Security proofs for identity-based identification and signature schemes
- Efficient signature generation by smart cards
- Security arguments for digital signatures and blind signatures
- Compact multi-signatures for smaller blockchains
- The algebraic group model and its applications
- Taming the many EdDSAs
- Security of hedged Fiat-Shamir signatures under fault attacks
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- Aurora: transparent succinct arguments for R1CS
- Simple Schnorr multi-signatures with applications to bitcoin
- On tight security proofs for Schnorr signatures
- Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies
- Security Proofs for Signature Schemes
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
- High-Speed High-Security Signatures
- Hash function requirements for Schnorr signatures
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Randomly Failed! The State of Randomness in Current Java Implementations
- Advances in Cryptology - CRYPTO 2003
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
This page was built for publication: Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures