We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the communication of the Fiat Shamir authentication scheme to a single round while preserving the efficiency of the scheme. This also reduces the length of Fiat Shamir signatures. Using secret keys consisting of small integers we reduce the time for signature generation by a factor 3 to 4. We propose a variation of our scheme using class groups that may be secure even if factoring large integers becomes easy.
International audienceIn this paper we present three digital signature schemes with tight security r...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortuna...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-b...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
International audienceIn this paper we present three digital signature schemes with tight security r...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortuna...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) tran...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
This paper provides a framework to treat the problem of building signature schemes from identificati...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-b...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
International audienceIn this paper we present three digital signature schemes with tight security r...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
The goal of cryptography is to construct secure and efficient protocols for various tasks. Unfortuna...