Forking lemma

Results: 9



#Item
1Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

Add to Reading List

Source URL: soc1024.ece.illinois.edu

Language: English - Date: 2017-09-18 20:31:22
2Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-03-07 03:55:29
    3Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

    Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

    Add to Reading List

    Source URL: soc1024.ece.illinois.edu

    Language: English - Date: 2017-09-18 20:31:22
    4Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1  IBM Research – Zurich, Switzerland

    Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

    Add to Reading List

    Source URL: www.neven.org

    Language: English - Date: 2012-04-18 06:08:49
    5Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

    Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-18 04:58:38
    6Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

    Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-21 04:48:54
    7A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

    A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2008-09-15 00:54:52
    8On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France  18 April, EUROCRYPT 2012

    On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2012-04-20 07:04:21
    9Special Signature Schemes and Key Agreement Protocols Caroline J. Kudla Thesis submitted to the University of London for the degree of Doctor of Philosophy

    Special Signature Schemes and Key Agreement Protocols Caroline J. Kudla Thesis submitted to the University of London for the degree of Doctor of Philosophy

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2006-05-22 10:47:54