Back to Results
First PageMeta Content
Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature


Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole
Add to Reading List

Document Date: 2013-12-18 04:58:38


Open Document

File Size: 464,02 KB

Share Result on Facebook

Company

Fiat / NTT Secure Platform Laboratories / /

Country

France / /

Currency

USD / /

/

IndustryTerm

generation algorithm / agreement protocols / search version / cyclic / verification algorithm / online/offline scheme / search-to-decision reduction / prover algorithm / online signature generation step / normal key generation algorithm / identification protocol / search problem / deterministic algorithm / lossy key generation algorithm / lambda algorithm / /

Position

Prime Minister / /

Technology

distinguishing algorithm / cryptography / three algorithms / lambda algorithm / normal key generation algorithm / PPT algorithm / key generation algorithm / public key / signing algorithm / GPS / prover algorithm / verification algorithm / deterministic algorithm / identification protocol / secret key / simulation / key agreement protocols / digital signature / lossy key generation algorithm / canonical three-move protocol / /

SocialTag