<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Post-quantum cryptography / Digital signature / Hash-based cryptography / Forking lemma / Blind signature / Schnorr signature / Key / Ring signature / RSA / Group signature
Date: 2017-09-18 20:31:22
Cryptography
Public-key cryptography
Post-quantum cryptography
Digital signature
Hash-based cryptography
Forking lemma
Blind signature
Schnorr signature
Key
Ring signature
RSA
Group signature

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

Add to Reading List

Source URL: soc1024.ece.illinois.edu

Download Document from Source Website

File Size: 480,53 KB

Share Document on Facebook

Similar Documents

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

DocID: 1xVjp - View Document

Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

DocID: 1uvqP - View Document

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

Parts of this work previously appeared at ACM CCSBN06] and CT-RSABN07]. This is the full version. New Multi-Signature Schemes and a General Forking Lemma Mihir Bellare1

DocID: 1ul1N - View Document

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1  IBM Research – Zurich, Switzerland

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

DocID: 16pCW - View Document