www-cse.ucsd.edu/users/sshoup Abstract. We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert three-move identification protocols into two-tier signature schemes with a proof of security that makes a standard assumption on the hash function rather than modeling it as a random oracle. The result requires security of the starting protocol against concurrent attacks. We can show that numerous protocols have the required properties and so obtain numerous efficient two-tier schemes. Our first application is a two-tier scheme based trans-form of any unforgeable signature scheme into a strongly unforgeable one. (This extends Boneh, Shen and Waters [8] whose transform only applies ...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We give a new method to turn identification schemes into signature schemes with two advan-tages over...
International audienceThe well-known forking lemma by Pointcheval and Stern has been used to prove t...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
International audienceIt is known how to transform certain canonical three-pass identification schem...
Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
This paper provides a framework to treat the problem of building signature schemes from identificati...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We give a new method to turn identification schemes into signature schemes with two advan-tages over...
International audienceThe well-known forking lemma by Pointcheval and Stern has been used to prove t...
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
International audienceIt is known how to transform certain canonical three-pass identification schem...
Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing...
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shami...
We propose two improvements to the Fiat Shamir authentication and signature scheme. We reduce the co...
Abstract. Fischlin’s transformation is an alternative to the standard Fiat-Shamir transform to turn ...
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature...
We propose two improvements to the Fiat Shamir authentication and signa-ture scheme. We reduce the c...
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of...
This paper provides a framework to treat the problem of building signature schemes from identificati...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
We give a new method to turn identification schemes into signature schemes with two advan-tages over...
International audienceThe well-known forking lemma by Pointcheval and Stern has been used to prove t...